Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 13:18
Static task
static1
Behavioral task
behavioral1
Sample
4012805f24078924e25213daf5c104bc_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4012805f24078924e25213daf5c104bc_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4012805f24078924e25213daf5c104bc_JaffaCakes118.html
-
Size
111KB
-
MD5
4012805f24078924e25213daf5c104bc
-
SHA1
73bc49b7065e070e489ab99fd268e5c2d06d0ea7
-
SHA256
625166bf0721375ae5899e8ed194fbcd1fad60d6bffeb2658e792d767276eebe
-
SHA512
8634c85a30e166758352dbcc22ef7e89c5dbbf642ce3195bed97c4bc88c79a5466c12a3f29eb80ccb3f8e46f958dff65c5f0479451152fbbd37ef5629cbdaf3f
-
SSDEEP
1536:fsOrm46B5ZqvYdLPciaXyz3K+IMz+5m5EwpoNJxtWdY0ywefYRkHXl3Tc/qbiOjN:bmK2hSSwesVDcibacWqK0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 2300 msedge.exe 2300 msedge.exe 2576 identity_helper.exe 2576 identity_helper.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2300 wrote to memory of 5068 2300 msedge.exe 84 PID 2300 wrote to memory of 5068 2300 msedge.exe 84 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 3560 2300 msedge.exe 85 PID 2300 wrote to memory of 4376 2300 msedge.exe 86 PID 2300 wrote to memory of 4376 2300 msedge.exe 86 PID 2300 wrote to memory of 3840 2300 msedge.exe 87 PID 2300 wrote to memory of 3840 2300 msedge.exe 87 PID 2300 wrote to memory of 3840 2300 msedge.exe 87 PID 2300 wrote to memory of 3840 2300 msedge.exe 87 PID 2300 wrote to memory of 3840 2300 msedge.exe 87 PID 2300 wrote to memory of 3840 2300 msedge.exe 87 PID 2300 wrote to memory of 3840 2300 msedge.exe 87 PID 2300 wrote to memory of 3840 2300 msedge.exe 87 PID 2300 wrote to memory of 3840 2300 msedge.exe 87 PID 2300 wrote to memory of 3840 2300 msedge.exe 87 PID 2300 wrote to memory of 3840 2300 msedge.exe 87 PID 2300 wrote to memory of 3840 2300 msedge.exe 87 PID 2300 wrote to memory of 3840 2300 msedge.exe 87 PID 2300 wrote to memory of 3840 2300 msedge.exe 87 PID 2300 wrote to memory of 3840 2300 msedge.exe 87 PID 2300 wrote to memory of 3840 2300 msedge.exe 87 PID 2300 wrote to memory of 3840 2300 msedge.exe 87 PID 2300 wrote to memory of 3840 2300 msedge.exe 87 PID 2300 wrote to memory of 3840 2300 msedge.exe 87 PID 2300 wrote to memory of 3840 2300 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4012805f24078924e25213daf5c104bc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92db846f8,0x7ff92db84708,0x7ff92db847182⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,9928457176659783459,6091131514309111709,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,9928457176659783459,6091131514309111709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,9928457176659783459,6091131514309111709,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9928457176659783459,6091131514309111709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9928457176659783459,6091131514309111709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9928457176659783459,6091131514309111709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9928457176659783459,6091131514309111709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9928457176659783459,6091131514309111709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9928457176659783459,6091131514309111709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,9928457176659783459,6091131514309111709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,9928457176659783459,6091131514309111709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9928457176659783459,6091131514309111709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9928457176659783459,6091131514309111709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9928457176659783459,6091131514309111709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6240 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9928457176659783459,6091131514309111709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6192 /prefetch:12⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,9928457176659783459,6091131514309111709,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:556
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5c482a8fc98782e14e5150fc0c26a76d9
SHA10e86cec01b92687c8204dfdb4979cf2aac94d656
SHA256dd8c87633586a1306d583b0bd242b6c2f14b628dd413ce5ae57b38b3e75e0167
SHA5122c7b1fb7c8e33f5f7e328113971d2257085f84ba6b249acd83c50e3ebd39370988b4b21ae73022c1302039528c89c2d42a8600d3f9ee2eaa14e28131eb41687f
-
Filesize
2KB
MD560319832c6e6cbb558b3b208ae1ea74b
SHA17ccce33edf49e8c0075f34ab00b7a5d88e6492ce
SHA2568f107bf0164638918bdb0fe3299433407f69b3a7c2af2afaeda920b08045e0ba
SHA5126391974d9bb566df17669b1d6ff3f23d279c721c208bdfa22e6a4dd9e87a221569a26aa3676ae421ccfefe1ae3aa90782536107eccfa6a29262f856d0366c181
-
Filesize
6KB
MD5715f91da37b51ed784febe7eda8ec9e7
SHA18996a1657b5e33772b91222a9e60257d0d5c74dd
SHA2562efb95f2f28882930fc7132642c351264018d946e073ff4926410f8a71e436f2
SHA512f29ae265f13aa36f74d738708a3fe4f597e7ab1131564605b8706829da140f198aafb374d47aae9b0f98902aafed64cf84655c2aa7ea6ef364b09eaa9da67519
-
Filesize
6KB
MD5f64bbb360a54a6aa53c892829c564e6c
SHA108ef5cc924d0b6dfa868124ca935d276932f63ca
SHA25633ece945706e66537648571d3abb3c50c8db3dfd5263334395d63edbd07d2293
SHA5122ad74c91cffa2924c787dd0f133d5b1290dbe45058abaa628a605d0954c4016b66a70a5a7fd83c127b494e9673b109f57c5b3497a8fb5572f957ead9865b4314
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f78864b6-10dc-4e2f-8b0e-8742ca4d856e.tmp
Filesize2KB
MD525f6ba6648eb1f3cc37c4bb72197b71a
SHA100015fa5dc1406d2835e8b1ec854c262110c040a
SHA256770096e6ecd8fe942a3c83a3d81d8add43681764fb1acecbdc88b36257ee8e12
SHA512954390393cbe4f32baaebec192c20a45c739a2419380d86c956d8327c6cba3e5549d6bb9dc4b408c90c11a2805562f7187492b5c712577c580cdb6f85bf33cfd
-
Filesize
10KB
MD57ca443647c696c81b704db1b1015de57
SHA1c39ede786cf808ee149ded1e38f40f444ec7aa08
SHA256b27341daafa3d3d87afca948cf2a5393cb1cb0feb8ff8b569fcf99e66f5ac513
SHA512500dcb8991e0811b369b96343532194e01b0562a2dcf45b598f12a1ae103da311bb9e121549e1cf2f4658e4b28e1a7ea6f28ec465a64d41fd4ff110216941bea