Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
4956e1e25629355b4a4e062408201261_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4956e1e25629355b4a4e062408201261_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4956e1e25629355b4a4e062408201261_JaffaCakes118.html
-
Size
175KB
-
MD5
4956e1e25629355b4a4e062408201261
-
SHA1
0249a6fcdbe30c82b32d67edc650a899e50af82f
-
SHA256
2c11f1a2ff04bc268af47a5d0a89411a406699d3dd564e020c8fd25bd5fbbb5e
-
SHA512
763b2929a6b6951abec3e49e946fb6801094f3358290c0fcd605505207ab7b50d5af3cf935e498ab8bb207a2ecd381165712a9160b3c89e458e0a8eb7237d8ad
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3gGNkFjYfBCJiZQ+aeTH+WK/Lf1/hpnVSV:S9CT3g/F6BCJi3B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 2044 msedge.exe 2044 msedge.exe 1660 identity_helper.exe 1660 identity_helper.exe 5708 msedge.exe 5708 msedge.exe 5708 msedge.exe 5708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2044 wrote to memory of 5088 2044 msedge.exe 82 PID 2044 wrote to memory of 5088 2044 msedge.exe 82 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 3684 2044 msedge.exe 83 PID 2044 wrote to memory of 1704 2044 msedge.exe 84 PID 2044 wrote to memory of 1704 2044 msedge.exe 84 PID 2044 wrote to memory of 1548 2044 msedge.exe 85 PID 2044 wrote to memory of 1548 2044 msedge.exe 85 PID 2044 wrote to memory of 1548 2044 msedge.exe 85 PID 2044 wrote to memory of 1548 2044 msedge.exe 85 PID 2044 wrote to memory of 1548 2044 msedge.exe 85 PID 2044 wrote to memory of 1548 2044 msedge.exe 85 PID 2044 wrote to memory of 1548 2044 msedge.exe 85 PID 2044 wrote to memory of 1548 2044 msedge.exe 85 PID 2044 wrote to memory of 1548 2044 msedge.exe 85 PID 2044 wrote to memory of 1548 2044 msedge.exe 85 PID 2044 wrote to memory of 1548 2044 msedge.exe 85 PID 2044 wrote to memory of 1548 2044 msedge.exe 85 PID 2044 wrote to memory of 1548 2044 msedge.exe 85 PID 2044 wrote to memory of 1548 2044 msedge.exe 85 PID 2044 wrote to memory of 1548 2044 msedge.exe 85 PID 2044 wrote to memory of 1548 2044 msedge.exe 85 PID 2044 wrote to memory of 1548 2044 msedge.exe 85 PID 2044 wrote to memory of 1548 2044 msedge.exe 85 PID 2044 wrote to memory of 1548 2044 msedge.exe 85 PID 2044 wrote to memory of 1548 2044 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4956e1e25629355b4a4e062408201261_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f56546f8,0x7ff8f5654708,0x7ff8f56547182⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,4459108079820339458,5775048465912451298,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,4459108079820339458,5775048465912451298,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,4459108079820339458,5775048465912451298,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4459108079820339458,5775048465912451298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4459108079820339458,5775048465912451298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4459108079820339458,5775048465912451298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4459108079820339458,5775048465912451298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4459108079820339458,5775048465912451298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4459108079820339458,5775048465912451298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4459108079820339458,5775048465912451298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4459108079820339458,5775048465912451298,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4459108079820339458,5775048465912451298,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:82⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4459108079820339458,5775048465912451298,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4459108079820339458,5775048465912451298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:5388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4459108079820339458,5775048465912451298,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:5396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,4459108079820339458,5775048465912451298,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1300 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD556fa08bb7bf11c1ee55b4ebdc802a270
SHA1547a8043252a8d05b64d0b2b821ee630039a59ef
SHA25680c2198c2f8b03259f70d8d140e953e1f9218fa9b22162bcdced46553f319e96
SHA51200eb3e18cac28d015a2143e80659dd4bd350b9860a559773e06cfc6dc81a6345961ec1241ec075f198238ea8eafeb00784de392697738d369f4727796104287c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index
Filesize72B
MD55ea122cc3eec9633e4fef7fa62a468ab
SHA1760588954b9bd0bb26f8cc1ed3b0c6fc1be99c9e
SHA25663e98c7dc9c39a5fcb04e3fdc9d1be3385bab315a23f08664590e181a84b2c29
SHA512c406f5daec745d9b63f185e9921e0d8ec2bbc5b94ed3404a3b60158aa4c9976f279c3a84c814e91c28ce7c59faa044ae9eb16947899a21a7d413f4df17c66cbd
-
Filesize
2KB
MD5bb81d10ecebeb9bb9b6c2937fbc537b3
SHA14f69871353ca5d71761bc8350d5c61e5b8361509
SHA256a8bb80a6d5fc01a37edb1fee9d5838b80466763839ca792ac577f0524973bf57
SHA512652808bcac1204075391137cad24ea4eef01ccb031f7b01de6e12a671bf439463a57ae46999109036fc8c0241a19f3f71c4cd89089df8429f92fda07688adb8c
-
Filesize
2KB
MD5da24e26ae036eb9003c27b2f93028da0
SHA1808d19fefe2602773588e37dd7e3b049e1aa7194
SHA2560badc1549c9d052a4c3d60a0497bad5ef7a8ad472e8f5d2c7f55191fad3988a7
SHA51270fa1866a4400c23c08815a33c7681683221083558fbbf1d7e297760ea89a73fe324126c2ef23411ba64de100e4f605d4f5f8b94ef6a075ae5a9be457da42b4c
-
Filesize
5KB
MD5b130767dbba5380b73137f7685bd1823
SHA1986eeac60c1abd40891c8af27d3a4428dc07c7e0
SHA2561a5f7e25d1ce559c788ba7205d655b84010d1838c107808b511f0e0108998125
SHA5121bc8cb143a6c45800dc598f81a70b9a2d35e099a607a60dc329421f927bfb657ed0cef7ac473a43cad16331ef2b243910e37dd66f4462515617357bfccc6ac27
-
Filesize
7KB
MD5217c863f8d0695a9cf58812766721d65
SHA107d6f5b958725cab170957fe78aae1a448239b35
SHA2569b3c8bc794365b6bab1bdd24ddf5148a057ae8f52ca20971004543214c7fb691
SHA512b08f3a53fa6fa67533906fd6b6adc6f890be5c8f0b489c70e9b155796c4e4c6396bb44cf790ff4d151a15fdb50631a8d8d733c9b459068183585b81f3cb6675a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ccc1d3e17cc309486e68b9c5e96a7c97
SHA10bc18e05b2d3f4368506c15185fa7746194414b6
SHA256da7759ce47cb4c3cb57bb010e0098e2a294e381201a1304c1344a1a2a1a8eea6
SHA5125bd81057951018599a5738e142b1bc925669bcfa98950346ac30de34309b4230c606e770632c3305fe6162bb63b4b295cb4c4bc1e72bf0f52d778015761a4164