Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
6131f3c570c04cbd139352e60e59cff4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6131f3c570c04cbd139352e60e59cff4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6131f3c570c04cbd139352e60e59cff4_JaffaCakes118.html
-
Size
175KB
-
MD5
6131f3c570c04cbd139352e60e59cff4
-
SHA1
b4289909ce549c0ae5872a41fce1c90d7296904f
-
SHA256
53d10a79a40799bb28e1d4392545ff766e18adf28bf6e67c25e6219460d0d1be
-
SHA512
0677d2da6ca5d787e5719e55a845d3d07907c4865c8f0cbc9012c119f1f67d05225770d9ac4ef67baa475ff3a2d4d0a74aced5f194c00b666744c4283c5d1dd1
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS3eGNkFAYfBCJis2+aeTH+WK/Lf1/hmnVSV:S4oT3e/F1BCJikm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 2972 msedge.exe 2972 msedge.exe 1948 identity_helper.exe 1948 identity_helper.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2972 wrote to memory of 3852 2972 msedge.exe 82 PID 2972 wrote to memory of 3852 2972 msedge.exe 82 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1216 2972 msedge.exe 85 PID 2972 wrote to memory of 1148 2972 msedge.exe 86 PID 2972 wrote to memory of 1148 2972 msedge.exe 86 PID 2972 wrote to memory of 4944 2972 msedge.exe 87 PID 2972 wrote to memory of 4944 2972 msedge.exe 87 PID 2972 wrote to memory of 4944 2972 msedge.exe 87 PID 2972 wrote to memory of 4944 2972 msedge.exe 87 PID 2972 wrote to memory of 4944 2972 msedge.exe 87 PID 2972 wrote to memory of 4944 2972 msedge.exe 87 PID 2972 wrote to memory of 4944 2972 msedge.exe 87 PID 2972 wrote to memory of 4944 2972 msedge.exe 87 PID 2972 wrote to memory of 4944 2972 msedge.exe 87 PID 2972 wrote to memory of 4944 2972 msedge.exe 87 PID 2972 wrote to memory of 4944 2972 msedge.exe 87 PID 2972 wrote to memory of 4944 2972 msedge.exe 87 PID 2972 wrote to memory of 4944 2972 msedge.exe 87 PID 2972 wrote to memory of 4944 2972 msedge.exe 87 PID 2972 wrote to memory of 4944 2972 msedge.exe 87 PID 2972 wrote to memory of 4944 2972 msedge.exe 87 PID 2972 wrote to memory of 4944 2972 msedge.exe 87 PID 2972 wrote to memory of 4944 2972 msedge.exe 87 PID 2972 wrote to memory of 4944 2972 msedge.exe 87 PID 2972 wrote to memory of 4944 2972 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6131f3c570c04cbd139352e60e59cff4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff936df46f8,0x7ff936df4708,0x7ff936df47182⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1808,11707439464243252723,2090345381465136337,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1808,11707439464243252723,2090345381465136337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1808,11707439464243252723,2090345381465136337,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,11707439464243252723,2090345381465136337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,11707439464243252723,2090345381465136337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,11707439464243252723,2090345381465136337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,11707439464243252723,2090345381465136337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,11707439464243252723,2090345381465136337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,11707439464243252723,2090345381465136337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1808,11707439464243252723,2090345381465136337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1808,11707439464243252723,2090345381465136337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,11707439464243252723,2090345381465136337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,11707439464243252723,2090345381465136337,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,11707439464243252723,2090345381465136337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:5712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,11707439464243252723,2090345381465136337,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:5720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1808,11707439464243252723,2090345381465136337,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5b3874c6f9c6454c0662ae58a5c7ccc28
SHA1b4c909da5a624c0684a5269f6e26d6c3a53dd3f1
SHA256b477de98fb2132e3c2010ff028aef415b9f620ed36385d67593f5e80f1a35e24
SHA512e844d949934922e51e1cf33de42cb804a5d33c74282ccede7387d8183539e1cd69a8463b38af854a72bbb4e21a13b42fb5c0cac7ae8c35ea501806ca62184b25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index
Filesize72B
MD555dbf3a95cefdad5fcdbdaa577b8d942
SHA19548166d863cde63fcf7d5785921a044b7443fd9
SHA256e4e96af24841eb5dd64f77e09e8a49f4055c8df32fa60de2892a0a252570c5e1
SHA512eb4ac04ef9af85b12e46aff99ebfed7c2a411532616fb9cea209188cda608c268c69d7f0b8e2d807b08ce360b7d4e6a719d54de5fb0c6d628ef07980abc0b0cf
-
Filesize
2KB
MD54825e536e1c2ff2f34b1ea25f12ca7d3
SHA13b1c2e3129246be94893ea8eb305225a7785747d
SHA25684bd18a14900c92bdb87ab748a124692609da289cf4b2ed87a0f4f456847475a
SHA5122724682399d876399f55e44ca3a95f7678654ca9b827de879cfb1480e90115e9b283dc7d684b6f90da9866b0de6feb235d76b20f583b47602b120fdc19a1105c
-
Filesize
2KB
MD59068b13783cd1224bd7822fd9e73ea93
SHA114374b5fe725a144caab6ce134a15f8eb259c708
SHA256671d31ccd150df06b81bf1ed1c3f167af2e783fbbb9a5fd9e7f2cc446645753f
SHA5121653ad11d756d22e48b0e4a19be0b52c449546de1cda08e1e823fe87471b1110932ea1c4e55002d2272c2256ee8daee38e33b44679292094be8b7458718de9bb
-
Filesize
5KB
MD56cb3456861840076f748b449e119360b
SHA18875817d5327682b57b6b95ba96901fe617296bb
SHA2567c69064b7a157b964bdfbf0ee53cd57b5e8c97e6ba77860e6e8533646457446f
SHA51224ab9304fe4aad6f2b804abaa7b994adaf94cfd83d48d26caf7b3dd9160f6a0459b665fb77c62e5c67cb29813c4fdb5cda35f61b63d45fa5eb9655f3f9a2fb23
-
Filesize
7KB
MD5b9f9bf986d54690f3457b8f3a893c20a
SHA19523aee17271035c0d1be2b15e2bfc2bc6db8665
SHA256c769f08a5ccd1ed6c57fbd61db3d24b12352243553cc076a153aed309ce948a4
SHA51273f8b8a47add42a756808e5364d2e31474d02ce0f313f2d94adb6f5b552e088500a3c97a047ac36ec4deb6006596bda08137cc058557d54f5fe0349c2d728b46
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b3d3ded7e98d4d53fe9be266a0ad1710
SHA1eacf921fb395db8502fd44d606a79c9a7320707d
SHA25660ae67202b792479299572c78202012297ec9d1344848071f62ae06351962f14
SHA5124e4205566cbf4a8b2f67eba4bd038414c8648ef427d033d4f36e43ee271da90c42a53329a69b26fb3519d0b7d6faa560d96a8eefc83796d1e3cb7144afd60c92