Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 20:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d124f22b1d7e7607ee1b728b01d656bf.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d124f22b1d7e7607ee1b728b01d656bf.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_d124f22b1d7e7607ee1b728b01d656bf.html
-
Size
235KB
-
MD5
d124f22b1d7e7607ee1b728b01d656bf
-
SHA1
647526afdf37b4d8ef3ce54fb42b74f4f8d0b68e
-
SHA256
c2475c5fd68e14b7f827056d6232897e61a43e7779d20d60b12d6e6ed51b2e0d
-
SHA512
a2f692d523eb224476b90b8e9d46798808c29fba3a3dd602b8dc8bd8be3beb529ed63143e535097ba0376fa83bf541ff11c9a26c5087fa165ad2305afc319ddc
-
SSDEEP
3072:f3vHW/shP2b12fhg7Fy+TIWY7RkTPSHSe0+dq:HHW0w5kE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2596 msedge.exe 2596 msedge.exe 3224 msedge.exe 3224 msedge.exe 4948 identity_helper.exe 4948 identity_helper.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3224 wrote to memory of 1768 3224 msedge.exe 83 PID 3224 wrote to memory of 1768 3224 msedge.exe 83 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 1248 3224 msedge.exe 84 PID 3224 wrote to memory of 2596 3224 msedge.exe 85 PID 3224 wrote to memory of 2596 3224 msedge.exe 85 PID 3224 wrote to memory of 4640 3224 msedge.exe 86 PID 3224 wrote to memory of 4640 3224 msedge.exe 86 PID 3224 wrote to memory of 4640 3224 msedge.exe 86 PID 3224 wrote to memory of 4640 3224 msedge.exe 86 PID 3224 wrote to memory of 4640 3224 msedge.exe 86 PID 3224 wrote to memory of 4640 3224 msedge.exe 86 PID 3224 wrote to memory of 4640 3224 msedge.exe 86 PID 3224 wrote to memory of 4640 3224 msedge.exe 86 PID 3224 wrote to memory of 4640 3224 msedge.exe 86 PID 3224 wrote to memory of 4640 3224 msedge.exe 86 PID 3224 wrote to memory of 4640 3224 msedge.exe 86 PID 3224 wrote to memory of 4640 3224 msedge.exe 86 PID 3224 wrote to memory of 4640 3224 msedge.exe 86 PID 3224 wrote to memory of 4640 3224 msedge.exe 86 PID 3224 wrote to memory of 4640 3224 msedge.exe 86 PID 3224 wrote to memory of 4640 3224 msedge.exe 86 PID 3224 wrote to memory of 4640 3224 msedge.exe 86 PID 3224 wrote to memory of 4640 3224 msedge.exe 86 PID 3224 wrote to memory of 4640 3224 msedge.exe 86 PID 3224 wrote to memory of 4640 3224 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d124f22b1d7e7607ee1b728b01d656bf.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad17946f8,0x7ffad1794708,0x7ffad17947182⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,1394824796175022529,18262966853087189509,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,1394824796175022529,18262966853087189509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,1394824796175022529,18262966853087189509,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1394824796175022529,18262966853087189509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1394824796175022529,18262966853087189509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1394824796175022529,18262966853087189509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1394824796175022529,18262966853087189509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3024 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1394824796175022529,18262966853087189509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,1394824796175022529,18262966853087189509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:82⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,1394824796175022529,18262966853087189509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1394824796175022529,18262966853087189509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1394824796175022529,18262966853087189509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6168 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1394824796175022529,18262966853087189509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1394824796175022529,18262966853087189509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,1394824796175022529,18262966853087189509,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5dee65b014a782e175c17949661e05fa7
SHA1abfc7625b26176ea8b91249b7978db84838daa72
SHA256db44a382c4594f08d350fe3dc3ae0e30847dbfc1f18b5e4000b33f5795adaf49
SHA5123ff3aea77deb3e04b46b6d9fcce1f0332aa5121cd8d4dba4517cd687d9ff27edcc3b199b26fc689355799f84e61f7744b3b600c73391748af13577e58e30aedf
-
Filesize
1KB
MD59196f7ec178bc7340b8004efb8505a03
SHA14597bf966068e4ffd3c95883dd0e461205f1fae5
SHA256df5597cd29da3fd11df59e1790c0450064a242f957a5406906ee59a02b733dd3
SHA5121b9fd009e4448c7ad38329fc8641de10757a60dd8f2a72fb14eb98c9886c7a622b42429349ae04020ead7b5448704c1eafb1a4203c9ca760c791a0ff1596641c
-
Filesize
5KB
MD5177b754cfec67579a68def1780092074
SHA167779612202102b0c7300b07aeb762e0a7e9e514
SHA2566f31919f905ab53e01c11c7579566a682822e4a897ceed6b05570da8f661281f
SHA512e5f0ebc405f3c915daa0fc4d35172637ad16a453b3163b9e72ea85318141633bc01b7de8bb56c186f54394e6f623720e0d0d6b5a9841711d8c1f0c51bfd90b9b
-
Filesize
7KB
MD5b9eeee9165c9bfbdc2cdec9b998367ff
SHA11eae92c78be768689084eadc53b29a91e6ec4d8d
SHA25636a14fa8629ecd71f931da4884e74c462d8013150b357a42dd1f79f30840c0d9
SHA51288f8246757000fa1e364dd317ff5d4ee5a160d8aa564b628649841dac047c1245eb0f01cd73353ccc6c3b660635684d45cf3e5981328197708c925610d8c8f69
-
Filesize
7KB
MD5e100c5f5df2d550fba3aeffc975686f5
SHA171ad8f8c655319fd64a12f4336941639cabab247
SHA256247edf7d9c23a870fe19fad7a526013e0cb9ea1fb8f16938f438e2dfa91a8608
SHA512bc6c5d43da6b8726b55ec5ca882aa0b8f0a5fed713b63842624e22f2f4a82b74811b68e2f6e95af21a715466774961fb73dd55d63a5b7ec22cec10f27295e462
-
Filesize
199B
MD5d5913295cb3d4f72c557d2dd08ce0022
SHA172239994bf4f936ef5ba758bce29d0e3fc0a14fb
SHA256a953859effa526bb564475bb2508ded212828c725170059cc41a4a87df39bff9
SHA5122aa5eda15156b4b6c4cacacce779e2fd76bc0d042f6d8790aec7ddabcb18da7d89645c218c518c9b38b65571ac95850a6585404a17880df698cf994db701ee0a
-
Filesize
199B
MD50e2606ace690e40a27d9e51d6e92badc
SHA1dc5ce821328650dee07418e0719978bf00d536e4
SHA256652e1f586def9626f4dd671fc726d38ada77338f8e5f0a7654908ec082c46a99
SHA512162b34ddb5b6d5e107477954d41b7715d0150722d15373767ca5b1d67b58eb6317d4014caf61ff5ee6b90338c1edf3644106b90f93239a86962f06ff8aa29802
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50eed9734769827ce4fbcb4502d36102d
SHA15f5c682c30e4752cb9ff11ab3c7dd778697f1837
SHA25613a7cadcb6392fce183061109813805e8ff6826a0f74967ef43e4aadde816848
SHA51269db682c3231ff1d72332dfffa21d528a51512e8fce0305ea6a4ddbae8197c35d7ec5e88737849163c03bf722bf28e6da7d98f01249204a77df34096f7049d99