Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
78a8bd0578958df07d3f2ef835387da2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
78a8bd0578958df07d3f2ef835387da2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
78a8bd0578958df07d3f2ef835387da2_JaffaCakes118.html
-
Size
53KB
-
MD5
78a8bd0578958df07d3f2ef835387da2
-
SHA1
8d666a413ddeff75d0ca31b30534df23048b5b05
-
SHA256
bd0d221b30393a2cded4bd5bf8c05d9193c4f82b2a4efe490367cd9881a6b99a
-
SHA512
a980bf35c4413c0a5c61d77fb9e8c89ac62955bd97cd25e879b874ab486b74fe9560c11e0d4cb8d082b914321c93d7acbed7fe1781020914d4f5be6885331802
-
SSDEEP
1536:/HlHMuNKARoCeZPoCeGPoCeAoCePoCenoCeRoCewNvN/:/lsIfSLgcgPmqo+NvN/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4180 msedge.exe 4180 msedge.exe 1488 msedge.exe 1488 msedge.exe 4400 identity_helper.exe 4400 identity_helper.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1488 wrote to memory of 444 1488 msedge.exe 82 PID 1488 wrote to memory of 444 1488 msedge.exe 82 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4888 1488 msedge.exe 83 PID 1488 wrote to memory of 4180 1488 msedge.exe 84 PID 1488 wrote to memory of 4180 1488 msedge.exe 84 PID 1488 wrote to memory of 1504 1488 msedge.exe 85 PID 1488 wrote to memory of 1504 1488 msedge.exe 85 PID 1488 wrote to memory of 1504 1488 msedge.exe 85 PID 1488 wrote to memory of 1504 1488 msedge.exe 85 PID 1488 wrote to memory of 1504 1488 msedge.exe 85 PID 1488 wrote to memory of 1504 1488 msedge.exe 85 PID 1488 wrote to memory of 1504 1488 msedge.exe 85 PID 1488 wrote to memory of 1504 1488 msedge.exe 85 PID 1488 wrote to memory of 1504 1488 msedge.exe 85 PID 1488 wrote to memory of 1504 1488 msedge.exe 85 PID 1488 wrote to memory of 1504 1488 msedge.exe 85 PID 1488 wrote to memory of 1504 1488 msedge.exe 85 PID 1488 wrote to memory of 1504 1488 msedge.exe 85 PID 1488 wrote to memory of 1504 1488 msedge.exe 85 PID 1488 wrote to memory of 1504 1488 msedge.exe 85 PID 1488 wrote to memory of 1504 1488 msedge.exe 85 PID 1488 wrote to memory of 1504 1488 msedge.exe 85 PID 1488 wrote to memory of 1504 1488 msedge.exe 85 PID 1488 wrote to memory of 1504 1488 msedge.exe 85 PID 1488 wrote to memory of 1504 1488 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\78a8bd0578958df07d3f2ef835387da2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8fd0746f8,0x7ff8fd074708,0x7ff8fd0747182⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,7207667755801097486,5790856108322298867,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,7207667755801097486,5790856108322298867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,7207667755801097486,5790856108322298867,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,7207667755801097486,5790856108322298867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,7207667755801097486,5790856108322298867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,7207667755801097486,5790856108322298867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,7207667755801097486,5790856108322298867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,7207667755801097486,5790856108322298867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,7207667755801097486,5790856108322298867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,7207667755801097486,5790856108322298867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,7207667755801097486,5790856108322298867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,7207667755801097486,5790856108322298867,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,7207667755801097486,5790856108322298867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:12⤵PID:340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,7207667755801097486,5790856108322298867,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,7207667755801097486,5790856108322298867,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5204 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5406d1e32fc82518534f7d6e90641b34d
SHA121029077d3a0daa245ed0d0432e7ce0938632a5e
SHA256036c1e04001322dd2dbb3633933e97e7a98ad4e0a7ebb605e33540382ed23799
SHA5128a990fb23303abc08a186a44db1c01258dd7cac13ab555b3e8b9a0bc08a5d9bcdeca423a1a85d50a0fe7216a9172cbc85242892ec629e42b06e0d8f56832d46b
-
Filesize
1KB
MD5db224890f76a50a7a63448a5fb2dda1a
SHA18cd7635d115c4db57e684331bc48fec47f3e850f
SHA256046f02bb0d323169c0dbf94434a55a2a6472b7cd084b7fb05d83e3451266eb51
SHA5129572a6973b52a07e14f47abba9ed2ea4af4320a99f210dcebe5a291c30e91ec1ec751721f71743caecbd91ab4555982d6dbea3952f0462fff677e9e0a38ed372
-
Filesize
1KB
MD55573923d4010a0ce2fb855553050f1fb
SHA165485a939da05df34de927994bb5a13414984be9
SHA25613d01a014fc3cbea243f55c8d3c93a64e12805d9e327905109608e1f0d8fcf50
SHA5129d89f9aac2000f5c68c72536370c0af51c6ef7b7d3b3428e3685dc0e2717d8dada73951c08261c460ac0dcfa38a01b156e5f63aff74b650204b29a6c9aa2457d
-
Filesize
5KB
MD5230fe4c022a0cdfccd95b2214448086f
SHA171d2843b25b6735e60658b030b5b0247470a2922
SHA2567588668855349664e95df92c8a86be8ce9c05a39f49b29afd14f3ab1495843b5
SHA512d3bd801949ee267f69233b39021519008b79747e8ffd815d55fb7980394d9ca4de7c59b60dba738fdd975a02b319171f106fcd242c44e383211df0563bd90dea
-
Filesize
6KB
MD5a3833b6b06503abb4d294e8486d00fed
SHA16b212466409a939486da53e8e2fdaca083fb5acc
SHA256ff48695307b32d620411ca633b663904ef7acb5e345704e430f39abe3638f1fd
SHA512c2cfd99e42da96a8319d3724e90a4fd844fd3fddcec651a77a0356d19911df5e46d20078ace8f37b8f2a1c3696985403a21ae2cfcd8c8000d0285a4181772906
-
Filesize
6KB
MD59273ea801909a36ab3984e0ef7d9748f
SHA1d8d9900c2401f2f846d4673245b91a77057353ab
SHA256dc9fcc987307ac4633fbd5a9125d6f6c0d719574cd60da2b17b299d60a8f42d8
SHA51222eb364969cee48d184545cdfd4d2ff5dc75744b9dd4f061c42892927e8d70cfab177a8aef93e35dc68b8d214d67011f3df48f9dee6b2606e0f7b689fcb8ddab
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5d540277e136e6b72467227b1aa062e3a
SHA1642f8cc311b5474e0262538c44e3dec71d922170
SHA25668cec25b171cee03f47f57a0fabc5270fc874796021871b608712a51488bba93
SHA5127f690b6b95a50a821abc1ea4b521840d33a7efcf38b7e196a9b6806767adfad8d9a2635c29ac9c1031fa3bf0a9d51cb7662876a512c68caf50924d3363f71c5f