Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 08:40
Static task
static1
Behavioral task
behavioral1
Sample
4a400c32ae8a8512975c864aada1aeb1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4a400c32ae8a8512975c864aada1aeb1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4a400c32ae8a8512975c864aada1aeb1_JaffaCakes118.html
-
Size
175KB
-
MD5
4a400c32ae8a8512975c864aada1aeb1
-
SHA1
f0178e37d2ea5c770e0c12016e6d0ca710eaf188
-
SHA256
ba23cba6d3c724cdec87d64097ca763b56814263128345d256790c338e0729f3
-
SHA512
2030b5302f8bba2cbcc525a77cfb76a0f3cbd76a71b5524e91176e68b9df873e53fe7827455e258c356996a2d5bced1ceff9682415549e01ab4c56203fa98045
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS3rGNkFuYfBCJis5+aeTH+WK/Lf1/hmnVSV:S4oT3r/FHBCJi5m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 3092 msedge.exe 3092 msedge.exe 436 identity_helper.exe 436 identity_helper.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3092 wrote to memory of 1556 3092 msedge.exe 83 PID 3092 wrote to memory of 1556 3092 msedge.exe 83 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 3656 3092 msedge.exe 84 PID 3092 wrote to memory of 2636 3092 msedge.exe 85 PID 3092 wrote to memory of 2636 3092 msedge.exe 85 PID 3092 wrote to memory of 4084 3092 msedge.exe 86 PID 3092 wrote to memory of 4084 3092 msedge.exe 86 PID 3092 wrote to memory of 4084 3092 msedge.exe 86 PID 3092 wrote to memory of 4084 3092 msedge.exe 86 PID 3092 wrote to memory of 4084 3092 msedge.exe 86 PID 3092 wrote to memory of 4084 3092 msedge.exe 86 PID 3092 wrote to memory of 4084 3092 msedge.exe 86 PID 3092 wrote to memory of 4084 3092 msedge.exe 86 PID 3092 wrote to memory of 4084 3092 msedge.exe 86 PID 3092 wrote to memory of 4084 3092 msedge.exe 86 PID 3092 wrote to memory of 4084 3092 msedge.exe 86 PID 3092 wrote to memory of 4084 3092 msedge.exe 86 PID 3092 wrote to memory of 4084 3092 msedge.exe 86 PID 3092 wrote to memory of 4084 3092 msedge.exe 86 PID 3092 wrote to memory of 4084 3092 msedge.exe 86 PID 3092 wrote to memory of 4084 3092 msedge.exe 86 PID 3092 wrote to memory of 4084 3092 msedge.exe 86 PID 3092 wrote to memory of 4084 3092 msedge.exe 86 PID 3092 wrote to memory of 4084 3092 msedge.exe 86 PID 3092 wrote to memory of 4084 3092 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4a400c32ae8a8512975c864aada1aeb1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe902246f8,0x7ffe90224708,0x7ffe902247182⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,18131338197258493524,18174093319620104844,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,18131338197258493524,18174093319620104844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,18131338197258493524,18174093319620104844,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,18131338197258493524,18174093319620104844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,18131338197258493524,18174093319620104844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,18131338197258493524,18174093319620104844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,18131338197258493524,18174093319620104844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,18131338197258493524,18174093319620104844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,18131338197258493524,18174093319620104844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,18131338197258493524,18174093319620104844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5992 /prefetch:82⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,18131338197258493524,18174093319620104844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5992 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,18131338197258493524,18174093319620104844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4520 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,18131338197258493524,18174093319620104844,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,18131338197258493524,18174093319620104844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4312 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,18131338197258493524,18174093319620104844,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4292 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,18131338197258493524,18174093319620104844,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
243B
MD51c4d00c652b54b3f6da6a8a0d13f9bd7
SHA10a092197d011f58ab8b7cef0b5b8532b3ab1a0c3
SHA2567598d5ca984712167d349d8fb464caf777082c67868eabe7fd94fca79317fb69
SHA51235e36ac363c76703d61464fdf033fa4ea51f53e5a256c5f6006b06ee0d369dfa126625a4d86749e7082ef2e2e130f16baf07d449dd14e2078a2c486504141ae0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD50d1af1c2413f209372cbab5540ab80b2
SHA123ab192c7b7c6d991f55ac88138a66df970888f5
SHA2562e819c35bf9b8f587d1eaff76e1e65bbf6462e8e65ed7c6ab36b72c80d5afca4
SHA512e6589c13cafecb7880e266a6f6dbd03a41bd1a11dba57c64ec5ea44808f2d4b40dafb9d0b385d21fb2894034695b3cd8533e8696e2c3a047e86457bb1b35ec0b
-
Filesize
2KB
MD58002139c2dd472c7cda9564d6b2ddc08
SHA1aafbb4d4a261dcc0cfceb83b86f8bcf289cef25a
SHA25639ad309d10b5fa5abd30e3529161383e78689df8bdcf7f036d1da4e62be88e34
SHA512d525d03781056d35045c5cf7cdaa16c293c58dda3d9d562a7566a8b52070218c474431a52b474abeed27e4daf4d935e6c8921dc170a76fba5b48d62e6dcc15b5
-
Filesize
2KB
MD56d83ab994442aee78f2347efbee80be8
SHA19d2195ea6a1cafdfd6fcbf2a133e37135780f08c
SHA256398475f76cc7089fe6bbc30c4f8d03ee5aba226ad15a87dbca60ca57ec5e3af2
SHA5121437819bbbb2278d04753d452925e7f888ba493326b263ac221959c011ca126740354d4f28a8e933177dc893b79841a499f8e6de17a40b2219546478176b6177
-
Filesize
5KB
MD58440ca8d3512cf319dc179d5c031adc6
SHA168662b21f42ce040e77e6273e131df739a6d7c4f
SHA256494c3359506abf0d0a02dcc6ca1b192011835bb75ecfe12a0e5c9ec0f4a6c574
SHA51299d8e597034c943f2f8e3c018a9a5b9a3ff8c98a0fb2063b12eb615ab9336b34bfee07a54e2d7a989bb722ac38d5c861e29e7d047d54e4ecb96b38783640a8f3
-
Filesize
7KB
MD5ab31ef9996b83afbeef11dd50dae31ae
SHA100c532c6a79d03402815a9ef9f32b1bfea9c64e5
SHA25687ebc997534da0395a7512a3fd1d355b5579a2acb7c2044bf5b3eb2ca5c82dcd
SHA51297b7a129de165220277b9502e9c70113ef7fc7eef573cb82ddd4c96cbc119835eb6f981ed44296e057e08673bc197bf519d3272c4ac2457e38fef05b85f6b89a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e2dab1f692a59d371f85ff7394a7577c
SHA1963348be0cf905e3a90d886104a44f5c342ff8ab
SHA2560c3793f66e42e27c9d2dc4fd84b47b33e874a99ddaaa697177f009241ef92932
SHA5128de3b9866f5f709a0827c6739807b874a19e925c30e0adee35f1d89b112a672977b4b2c262a704e70126614f6c656f0c3e0d6d06bf0f2a8df4a5b2235f6d7751