Overview
overview
3Static
static
34c4dbfa3e8...18.exe
windows7-x64
34c4dbfa3e8...18.exe
windows10-2004-x64
3$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3GDIPLUS.dll
windows7-x64
3GDIPLUS.dll
windows10-2004-x64
3MFC71.dll
windows7-x64
1MFC71.dll
windows10-2004-x64
1PGL.dll
windows7-x64
3PGL.dll
windows10-2004-x64
3Usermode.exe
windows7-x64
1Usermode.exe
windows10-2004-x64
1advapi32.dll
windows7-x64
1advapi32.dll
windows10-2004-x64
1dbghelp.dll
windows7-x64
1dbghelp.dll
windows10-2004-x64
1doc/ChangeLog.html
windows7-x64
1doc/ChangeLog.html
windows10-2004-x64
1doc/Interf...w.html
windows7-x64
1doc/Interf...w.html
windows10-2004-x64
1doc/Interf...w.html
windows7-x64
1doc/Interf...w.html
windows10-2004-x64
1doc/Interf...w.html
windows7-x64
1doc/Interf...w.html
windows10-2004-x64
1doc/Interf...w.html
windows7-x64
1doc/Interf...w.html
windows10-2004-x64
1doc/Interf...w.html
windows7-x64
1doc/Interf...w.html
windows10-2004-x64
1doc/Interf...w.html
windows7-x64
1doc/Interf...w.html
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 01:45
Static task
static1
Behavioral task
behavioral1
Sample
4c4dbfa3e810daed24fb1d2c13db904c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4c4dbfa3e810daed24fb1d2c13db904c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
GDIPLUS.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
GDIPLUS.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
MFC71.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
MFC71.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
PGL.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
PGL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Usermode.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
Usermode.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
advapi32.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
advapi32.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
dbghelp.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
dbghelp.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
doc/ChangeLog.html
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
doc/ChangeLog.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
doc/InterfaceAboutWindow.html
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
doc/InterfaceAboutWindow.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
doc/InterfaceColumnSeletionWindow.html
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
doc/InterfaceColumnSeletionWindow.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
doc/InterfaceDeviceInformationWindow.html
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
doc/InterfaceDeviceInformationWindow.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
doc/InterfaceFilterWindow.html
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
doc/InterfaceFilterWindow.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
doc/InterfaceGPSTesterWindow.html
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
doc/InterfaceGPSTesterWindow.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
doc/InterfaceMainWindow.html
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
doc/InterfaceMainWindow.html
Resource
win10v2004-20240709-en
General
-
Target
doc/ChangeLog.html
-
Size
6KB
-
MD5
72d447fac83515086704a4f9fb0f92d3
-
SHA1
5175d2c6893388660a3689c5a9e54712fa3588ba
-
SHA256
11d3e55c12d7d552e27e42d0833d6e4039a354130ed1c1d7d11b22077d8f5c12
-
SHA512
df59efed2238e6004c1d2cea3212d5f1fc33c4244c48030cf0cf7682c4eb4f072f79f1ae55cd9a26391283ee9edae64bf3207f4687c8ac99b984befb2e17151c
-
SSDEEP
96:SEFUJWZ/tyUf1nz3wuG9Uxk+eHd38cgpjfNUlv0swdEbigk8Gntd:ScQy/tbB7wuG9Ak+q3XeRMv0swbgL4z
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 2916 msedge.exe 2916 msedge.exe 2608 identity_helper.exe 2608 identity_helper.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe 2916 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2916 wrote to memory of 3284 2916 msedge.exe 84 PID 2916 wrote to memory of 3284 2916 msedge.exe 84 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 4908 2916 msedge.exe 86 PID 2916 wrote to memory of 3568 2916 msedge.exe 87 PID 2916 wrote to memory of 3568 2916 msedge.exe 87 PID 2916 wrote to memory of 1060 2916 msedge.exe 88 PID 2916 wrote to memory of 1060 2916 msedge.exe 88 PID 2916 wrote to memory of 1060 2916 msedge.exe 88 PID 2916 wrote to memory of 1060 2916 msedge.exe 88 PID 2916 wrote to memory of 1060 2916 msedge.exe 88 PID 2916 wrote to memory of 1060 2916 msedge.exe 88 PID 2916 wrote to memory of 1060 2916 msedge.exe 88 PID 2916 wrote to memory of 1060 2916 msedge.exe 88 PID 2916 wrote to memory of 1060 2916 msedge.exe 88 PID 2916 wrote to memory of 1060 2916 msedge.exe 88 PID 2916 wrote to memory of 1060 2916 msedge.exe 88 PID 2916 wrote to memory of 1060 2916 msedge.exe 88 PID 2916 wrote to memory of 1060 2916 msedge.exe 88 PID 2916 wrote to memory of 1060 2916 msedge.exe 88 PID 2916 wrote to memory of 1060 2916 msedge.exe 88 PID 2916 wrote to memory of 1060 2916 msedge.exe 88 PID 2916 wrote to memory of 1060 2916 msedge.exe 88 PID 2916 wrote to memory of 1060 2916 msedge.exe 88 PID 2916 wrote to memory of 1060 2916 msedge.exe 88 PID 2916 wrote to memory of 1060 2916 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\doc\ChangeLog.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc70c046f8,0x7ffc70c04708,0x7ffc70c047182⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,12071328509420239483,3423352569376832944,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,12071328509420239483,3423352569376832944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,12071328509420239483,3423352569376832944,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12071328509420239483,3423352569376832944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12071328509420239483,3423352569376832944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,12071328509420239483,3423352569376832944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,12071328509420239483,3423352569376832944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12071328509420239483,3423352569376832944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12071328509420239483,3423352569376832944,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12071328509420239483,3423352569376832944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12071328509420239483,3423352569376832944,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,12071328509420239483,3423352569376832944,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3324
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
6KB
MD5705a6b784c4bb0c847c0e299397130e0
SHA187d3a2fc8c8e04aa566ae7a2bc695bbd280edf0b
SHA25600b9920dcb3b9aa17ef431364cbf721d300284a61be1fd59457873530a6051bb
SHA512a961041c023ae5d61f0b546f15a4ef59b4038534ad1d380b43a8ab7741309417624aa705841dfd6405d57d036ee854ec838d205aa225cbd9cfab80c5d9ed57ff
-
Filesize
6KB
MD531338189cd4d95da5bcb82bdb33f2026
SHA1ce84ff969530bb18ca92314af67c3c2c286e17f2
SHA2567a351172d6638506026ba973af5b616817aba0a277fc74ffce3077b28a7a30f5
SHA5120d697b7349d1144c5ed3d51c0dd381f48711812febeb260947690c65a61213eff06bcc8da361310cf5303d6f0c80d7cf3169793677029ad109dd5b5530da8d6f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e0a972bf7d3fd65e71639e16551535d2
SHA1cd48efb24244340de95da3d44584a1abfd8cbe14
SHA2560b185de57ee1810e1d51b38ffb44f00afd4440044b6a7b2810aaa88123664347
SHA5123193899f6cf209a9d38074758411907c03759d9292f44066d448d429c4e53c94a784b2444de3fca8da1241fa3329857864576ac518ce912bed10c10360d42496