Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 13:42
Behavioral task
behavioral1
Sample
ea1df6ac514059f5b43de03324f4f458_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ea1df6ac514059f5b43de03324f4f458_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ea1df6ac514059f5b43de03324f4f458_JaffaCakes118.exe
-
Size
239KB
-
MD5
ea1df6ac514059f5b43de03324f4f458
-
SHA1
e3b0afaadd76be7fc918e702aba15968b8de64f7
-
SHA256
305cb25f4d3def69fab77f50c8321edd903572145fed9c7719821c918f591e1e
-
SHA512
3d82ce5a3945d2be20c0e254cba46d88bc0d41326771bdbe64c0c85cd85da25ddddfd5d5f8f2a5a7fe5025a9e6ba1d5622d1ed3badbd333f123126a54bd5ddc1
-
SSDEEP
6144:959ctEtelRV6dXYG+sVwsQzIGfQswvxFJg+E1PJjDVR7:vEV+V+pIGfRwLJg+mPJjRl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2576 www.he-collection.net.exe -
resource yara_rule behavioral2/memory/4028-0-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/files/0x000700000002321f-5.dat upx behavioral2/memory/2576-9-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/4028-11-0x0000000000400000-0x00000000007D2000-memory.dmp upx behavioral2/memory/2576-53-0x0000000000400000-0x00000000007D2000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 60 msedge.exe 60 msedge.exe 1880 msedge.exe 1880 msedge.exe 5080 identity_helper.exe 5080 identity_helper.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4028 ea1df6ac514059f5b43de03324f4f458_JaffaCakes118.exe 2576 www.he-collection.net.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4028 wrote to memory of 2576 4028 ea1df6ac514059f5b43de03324f4f458_JaffaCakes118.exe 87 PID 4028 wrote to memory of 2576 4028 ea1df6ac514059f5b43de03324f4f458_JaffaCakes118.exe 87 PID 4028 wrote to memory of 2576 4028 ea1df6ac514059f5b43de03324f4f458_JaffaCakes118.exe 87 PID 4028 wrote to memory of 1880 4028 ea1df6ac514059f5b43de03324f4f458_JaffaCakes118.exe 89 PID 4028 wrote to memory of 1880 4028 ea1df6ac514059f5b43de03324f4f458_JaffaCakes118.exe 89 PID 1880 wrote to memory of 2992 1880 msedge.exe 90 PID 1880 wrote to memory of 2992 1880 msedge.exe 90 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 4312 1880 msedge.exe 91 PID 1880 wrote to memory of 60 1880 msedge.exe 92 PID 1880 wrote to memory of 60 1880 msedge.exe 92 PID 1880 wrote to memory of 5032 1880 msedge.exe 93 PID 1880 wrote to memory of 5032 1880 msedge.exe 93 PID 1880 wrote to memory of 5032 1880 msedge.exe 93 PID 1880 wrote to memory of 5032 1880 msedge.exe 93 PID 1880 wrote to memory of 5032 1880 msedge.exe 93 PID 1880 wrote to memory of 5032 1880 msedge.exe 93 PID 1880 wrote to memory of 5032 1880 msedge.exe 93 PID 1880 wrote to memory of 5032 1880 msedge.exe 93 PID 1880 wrote to memory of 5032 1880 msedge.exe 93 PID 1880 wrote to memory of 5032 1880 msedge.exe 93 PID 1880 wrote to memory of 5032 1880 msedge.exe 93 PID 1880 wrote to memory of 5032 1880 msedge.exe 93 PID 1880 wrote to memory of 5032 1880 msedge.exe 93 PID 1880 wrote to memory of 5032 1880 msedge.exe 93 PID 1880 wrote to memory of 5032 1880 msedge.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea1df6ac514059f5b43de03324f4f458_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea1df6ac514059f5b43de03324f4f458_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\www.he-collection.net.exeC:\Users\Admin\AppData\Roaming\Adobe\Acrobat\www.he-collection.net.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.he-collection.net/member/exe_contact.php2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9884246f8,0x7ff988424708,0x7ff9884247183⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1769449537404211746,361391191263901695,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:23⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,1769449537404211746,361391191263901695,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,1769449537404211746,361391191263901695,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:83⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1769449537404211746,361391191263901695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:13⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1769449537404211746,361391191263901695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:13⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1769449537404211746,361391191263901695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:13⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1769449537404211746,361391191263901695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3744 /prefetch:13⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1769449537404211746,361391191263901695,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:83⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1769449537404211746,361391191263901695,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1769449537404211746,361391191263901695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:13⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1769449537404211746,361391191263901695,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:13⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1769449537404211746,361391191263901695,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:13⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1769449537404211746,361391191263901695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:13⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1769449537404211746,361391191263901695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2672 /prefetch:13⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1769449537404211746,361391191263901695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1048 /prefetch:13⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1769449537404211746,361391191263901695,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4228 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4572
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5c71bb30-9a2b-4899-bc69-2ddc31343e2b.tmp
Filesize6KB
MD5c09a43de832a4538288990dd0ddec3e8
SHA16a0ac02fba595c7cbe8eca2e7ee00bb35c16ad3a
SHA25669fda277a681d87749d8df1f879bb7e117bd8e2dbcddb842bb773473d2129c5a
SHA512f3cbbcd09421368a3fa5071b774033a1bf86d7f83263cd75cc9b74bfa04b6421674366ed8998b6603957f4820770fd7ceef5c7a9e697e6f2d36cbe57db22888e
-
Filesize
6KB
MD5a85e387e20861c1fbe9fd951c09e61a5
SHA1ec8010271c2e4790d545b3a1141c82f24ca91d71
SHA2565a90b0c01538c4f0dec028ff252dec20d069f2de9c6a060317dcdaac194f2704
SHA51228f2fbf1edfc63efef9432076b37f4b8704cbf8c2749c78ee1e394fdc3e1a1017b962b17f46053f62bc29382bfe226d5d0ebe6f54d975dade3c77f02794ebd75
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50c6b3808f72e5adc6d252118531d976e
SHA13ccb5e86b29cf6e15768e0650b41d431d6377abe
SHA256dbb7df674fd60c37e1e67abf7a7add983df88105f439b3417b4e8ac768072415
SHA512a6fb0973b1c87e8a61bca0fb7315b1fdd1bfd394480a73609179e93cfca516c89bfa3662368ed92e09c9f68c7a8b819ff6c2b4eb25d200a9f70f149ad7e04a9c
-
Filesize
239KB
MD5ea1df6ac514059f5b43de03324f4f458
SHA1e3b0afaadd76be7fc918e702aba15968b8de64f7
SHA256305cb25f4d3def69fab77f50c8321edd903572145fed9c7719821c918f591e1e
SHA5123d82ce5a3945d2be20c0e254cba46d88bc0d41326771bdbe64c0c85cd85da25ddddfd5d5f8f2a5a7fe5025a9e6ba1d5622d1ed3badbd333f123126a54bd5ddc1