Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
6fd3e79fed4967ff9c1cb15022da517b_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6fd3e79fed4967ff9c1cb15022da517b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6fd3e79fed4967ff9c1cb15022da517b_JaffaCakes118.html
-
Size
175KB
-
MD5
6fd3e79fed4967ff9c1cb15022da517b
-
SHA1
77ab94cd1903febd746e9bfaf3bf455738f732d6
-
SHA256
df9ed0d8ddd915ce973f7abcd43ad49b66109c29f4f867990ad58ae9fab25b1f
-
SHA512
93b577c13d12587350a537338a4b83811c4d50473402c932d8bc4410c935f10130cd1458a1e3eaf3a185d15260eb4ba3578336e0bc85cb4cb38a4c370297422d
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3XGNkFhYfBCJisr+aeTH+WK/Lf1/hmnVSV:SOoT3X/F0BCJibm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3732 msedge.exe 3732 msedge.exe 2672 msedge.exe 2672 msedge.exe 5284 msedge.exe 5284 msedge.exe 5284 msedge.exe 5284 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 1888 2672 msedge.exe 83 PID 2672 wrote to memory of 1888 2672 msedge.exe 83 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 4488 2672 msedge.exe 84 PID 2672 wrote to memory of 3732 2672 msedge.exe 85 PID 2672 wrote to memory of 3732 2672 msedge.exe 85 PID 2672 wrote to memory of 968 2672 msedge.exe 86 PID 2672 wrote to memory of 968 2672 msedge.exe 86 PID 2672 wrote to memory of 968 2672 msedge.exe 86 PID 2672 wrote to memory of 968 2672 msedge.exe 86 PID 2672 wrote to memory of 968 2672 msedge.exe 86 PID 2672 wrote to memory of 968 2672 msedge.exe 86 PID 2672 wrote to memory of 968 2672 msedge.exe 86 PID 2672 wrote to memory of 968 2672 msedge.exe 86 PID 2672 wrote to memory of 968 2672 msedge.exe 86 PID 2672 wrote to memory of 968 2672 msedge.exe 86 PID 2672 wrote to memory of 968 2672 msedge.exe 86 PID 2672 wrote to memory of 968 2672 msedge.exe 86 PID 2672 wrote to memory of 968 2672 msedge.exe 86 PID 2672 wrote to memory of 968 2672 msedge.exe 86 PID 2672 wrote to memory of 968 2672 msedge.exe 86 PID 2672 wrote to memory of 968 2672 msedge.exe 86 PID 2672 wrote to memory of 968 2672 msedge.exe 86 PID 2672 wrote to memory of 968 2672 msedge.exe 86 PID 2672 wrote to memory of 968 2672 msedge.exe 86 PID 2672 wrote to memory of 968 2672 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6fd3e79fed4967ff9c1cb15022da517b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb6a6b46f8,0x7ffb6a6b4708,0x7ffb6a6b47182⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9246851722947758553,4361981427650076954,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,9246851722947758553,4361981427650076954,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,9246851722947758553,4361981427650076954,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9246851722947758553,4361981427650076954,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9246851722947758553,4361981427650076954,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9246851722947758553,4361981427650076954,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9246851722947758553,4361981427650076954,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9246851722947758553,4361981427650076954,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9246851722947758553,4361981427650076954,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9246851722947758553,4361981427650076954,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 /prefetch:82⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9246851722947758553,4361981427650076954,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 /prefetch:82⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9246851722947758553,4361981427650076954,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9246851722947758553,4361981427650076954,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9246851722947758553,4361981427650076954,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:5364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9246851722947758553,4361981427650076954,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9246851722947758553,4361981427650076954,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5284
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5dd78596dfb816f5ae956133b5d7e333b
SHA18fdf2c9eb4c43283e320fa5385f5eb40dc91ec11
SHA256c27cafee99325d91ffe37427a38473e90663265040a7e097360cb218cfc488a4
SHA5122f27f0ad14726fe11a0888678f2a0e3bf3894af3e7383a152912495edc2b729c665e24dd640e9c3408da683658ebba3668ede9cb31fd5b87b957e2382bf2b928
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index
Filesize72B
MD5101c35a7781287edb7739179a7cadc06
SHA110e2b761661141f08e9451903b8c37d5821996b2
SHA2568a855b61dd28da840c0ede8d6178b7a4011a0bf6598d680899e099a2e89cd959
SHA5126d162caf5b840380c8e45440989221336e6164f7543e43b8fb2d9416bb4b1a196047b0d8e232a5d290e0c1aff0aded7a31c18347fc14468fce6c8ade3cb4e2fd
-
Filesize
2KB
MD5cf0bef762a6311cf194b85a97ca6e633
SHA12fb30e1edcff1d90d0271793af3473afef32ff3b
SHA256da30cbd968da89a8dbb9de15b6b27fc8d1cd19dcbf33b837510843fb795a171a
SHA512425196b45c6fa7c09cd6023e7c7ecae2e96b6ce2da8a832e6499caacb0c8991ddaa65b55f167c9974ca12daf969bfa7fe23670970c2b8ee6416cfa373ef0ad4d
-
Filesize
2KB
MD59668506dfb5abb886414cab70c6bfad1
SHA19911e3f7c7ff1d513f1c83cd908a66159702a8cc
SHA256f55151539735afb8bfef234b8acf5746ef5b63b7eea11dad3b7ebb9e611fae44
SHA512ad8a1156783ec7556c0cda71af784d62a43a2b5931d5b59dcacf4b5a4ee73f6cf0d4cea5f7836eb95ca53a5bbf7e359b0cd13e0f503c4235b3039ec8bedf33ef
-
Filesize
7KB
MD5fab3d7925cc8fdf9ba1ecd7aa060143a
SHA15e02902c5c910df2858b004357fb773c61430c8b
SHA256a68ec6f62c41f7771e67f17153feca32824e6696d65de6a5f6dce42cf3ab0112
SHA51238aea45ea2942dcbfe973d97a4a4a3b63768fc02261bf2a875b70d3f7e3dc73e59d16a19b80131766d79257756f61436f1c50a1c84a33aa7d4519ec376181a76
-
Filesize
5KB
MD5b48dce94ea38468527e0a8cba8a73ff8
SHA18e7d4c1d9af4ef29d8ba3386b315f63414e660eb
SHA2561cc04d28a760e55640aecd224b7753f2fc4e9ce2fd820b62d39688e9db7dbd7b
SHA51265e564e29d3c1cf41a1da9a4720f0fedbfb48ca12edd3d73b51b36046b067d6f195791cd2fba0a9627a0c4134889720427d3452f8f1987ddf821bc86fac3a750
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b2cd2d53a5305a8cfaf406188813876e
SHA18ed8f79bfd1da42cb75fbc6dc01662bb5023ebb5
SHA25644a5b025de1364f04d5d1944e311b6fcb87dbc09b1dd89969020bf91728a7e0d
SHA5123b1591c0f3706235e2a700205fe34c072f25cbfe1dc23957abc5b5d56dce206d5f51f3bc43c2219aea63e089be020b8e6fc7e7d8f6eb5bcbf53b92dffc452d4c