Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 11:10
Static task
static1
Behavioral task
behavioral1
Sample
571c54a9f405bd6248dbf8e896f683f2_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
571c54a9f405bd6248dbf8e896f683f2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
571c54a9f405bd6248dbf8e896f683f2_JaffaCakes118.html
-
Size
22KB
-
MD5
571c54a9f405bd6248dbf8e896f683f2
-
SHA1
25ea85c80be30bf342d7ded1c248aaa27ae8207c
-
SHA256
6588eb3ca2c9589974b19e1f43da444d5e1967dab4745c32a815e9e99c533e07
-
SHA512
2a3321c2d2df0bbacf21a520ce990ccd8a25e4c8724e3b8d6627fe87d3eca71bcd54b970e53c5a3bad6b2a02a73b09dd5fbbcbe8cc7e3a14fe8404438cb204c0
-
SSDEEP
384:szEuo6ZBbDCuwqiyeT3xypqd166VtjbzsQJaFXutJDdq:szEDsDhBiyerxypoH+wk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1780 msedge.exe 1780 msedge.exe 4372 msedge.exe 4372 msedge.exe 1692 identity_helper.exe 1692 identity_helper.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4372 wrote to memory of 1816 4372 msedge.exe 84 PID 4372 wrote to memory of 1816 4372 msedge.exe 84 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1880 4372 msedge.exe 85 PID 4372 wrote to memory of 1780 4372 msedge.exe 86 PID 4372 wrote to memory of 1780 4372 msedge.exe 86 PID 4372 wrote to memory of 464 4372 msedge.exe 87 PID 4372 wrote to memory of 464 4372 msedge.exe 87 PID 4372 wrote to memory of 464 4372 msedge.exe 87 PID 4372 wrote to memory of 464 4372 msedge.exe 87 PID 4372 wrote to memory of 464 4372 msedge.exe 87 PID 4372 wrote to memory of 464 4372 msedge.exe 87 PID 4372 wrote to memory of 464 4372 msedge.exe 87 PID 4372 wrote to memory of 464 4372 msedge.exe 87 PID 4372 wrote to memory of 464 4372 msedge.exe 87 PID 4372 wrote to memory of 464 4372 msedge.exe 87 PID 4372 wrote to memory of 464 4372 msedge.exe 87 PID 4372 wrote to memory of 464 4372 msedge.exe 87 PID 4372 wrote to memory of 464 4372 msedge.exe 87 PID 4372 wrote to memory of 464 4372 msedge.exe 87 PID 4372 wrote to memory of 464 4372 msedge.exe 87 PID 4372 wrote to memory of 464 4372 msedge.exe 87 PID 4372 wrote to memory of 464 4372 msedge.exe 87 PID 4372 wrote to memory of 464 4372 msedge.exe 87 PID 4372 wrote to memory of 464 4372 msedge.exe 87 PID 4372 wrote to memory of 464 4372 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\571c54a9f405bd6248dbf8e896f683f2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92e0746f8,0x7ff92e074708,0x7ff92e0747182⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9131366396173233132,5945792842205420007,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,9131366396173233132,5945792842205420007,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,9131366396173233132,5945792842205420007,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2584 /prefetch:82⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9131366396173233132,5945792842205420007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9131366396173233132,5945792842205420007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9131366396173233132,5945792842205420007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9131366396173233132,5945792842205420007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9131366396173233132,5945792842205420007,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 /prefetch:82⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9131366396173233132,5945792842205420007,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9131366396173233132,5945792842205420007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9131366396173233132,5945792842205420007,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9131366396173233132,5945792842205420007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9131366396173233132,5945792842205420007,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9131366396173233132,5945792842205420007,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD52c0e8fe65745bc6e29c9bc8b681476f3
SHA117b46e830bf916a6e72cf428e39fa61b75063682
SHA256ab4522b6942a6cbdde66ea8e96464ecbcf80ee26f0b94c8793b877d811e13c63
SHA5125bdcab1bc59464957bbd5f8cabd3b57b0be42dbbb1c2559899e5ceab2774bc8c3a1666663e80b74dcf84026a5791d3ce9dced9c25a4d1758f1f49bc60b920b59
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5c49655fc635d114310b79bf260507119
SHA1dd35d7e6c8c4af9a3d7d04f29e8909443128612f
SHA2569cf1bc024436b27ed3df1041bcd35fd492f98dd9b40f662bf4804ead1de2c028
SHA51297fa9c1ecf0f3b5e410de748c9ee21f2dd3e1596628ea1c84714baecc85e22f99fd37489dccdfa2551a7693d874f20b5588f58c1cb6358342fab9cc3dc4d5fd1
-
Filesize
1KB
MD5c38a4ec2851320d26ae65e6d883ca6fa
SHA1023d8f36566aeb222ced75804956962feef3a6d4
SHA2560a57e6631344767148623091c6ece4a2fdfb3352b98ac6e19973d223aa05ad98
SHA5123ced4b20079c356d63529e68ce6a704cd02eb04e5f47590fbb61b9da3532597af0c694afe52ec41726475fce1ef8839dd6781758a9055ecb531d3ff47025f4cc
-
Filesize
6KB
MD5bf442fb751a69a19f4a69e50b2a265d5
SHA1177b3f4fe0d220fcabd0252b7d8f1f601b56d14b
SHA256b0cca4902ee9327fe656d8a9c0d43f8692c7053d936ea7c0d4e891f6912aabb6
SHA51238166ff1162c515c29609cc33c0f7bfb5e366a29f4f2f6d3387879f1591e2c996408ae13aa672a98f717206a5b438b3ca5b16a11a9b502747c90fed46fabcc5b
-
Filesize
5KB
MD5f9d2e0c82d2a9cb5f5b6a92614694edd
SHA112d26dfdd4b38a400e6386b656903a65a8d88dbe
SHA256c7a5a8df2f30a477a5b38465e7991b3a6cafd13484b0e106d9bda613045c6681
SHA5123a875ea4614155c1a02570d6df7b9b18f31225c0acd77458ee1385e06e7e77d08c9c9d1c5582baf1374ee65d9c22fc598fbe2bcc74c2c09c8b6336fcd515fc6e
-
Filesize
6KB
MD58d25b2810aebb03fde2a8a776a50a0e8
SHA186306b34c74dc18911d7a87262734abe199f7c43
SHA2567ef56dbae2a1920125d810e9d2a90d436e36ecd12429c999f50382909605f11b
SHA512800906d6b17965af06130391f85e9fe52617adb85667ce1e1f85a7661f51994779756de3b078af39e468181deaf34414f6113721e4a70436868513693fc6994f
-
Filesize
703B
MD585adc37a05c3402a04210bbb85fbe6f1
SHA1d418cfa6811995b66d6188efbe4180560bf44633
SHA256d3e720551b2f695435408aad1a7230599762357e57f42964919a726173cf92af
SHA5121e37698d4f0bc592228955f9f40d34192be419d1312befd7f1d5c5500e48e9d297b1d655ac50a74a8eb880918e5aa067eb74d817bfe9591dd43f6a523bb8d79d
-
Filesize
201B
MD5e8210c1f56dbe385ca70d80d90db2cd8
SHA1999f0e7d54d0375fe8593fb750a072ce0cd36c49
SHA25601577d4c78c40b7025ecb94f3bcc96918635e020efc6f22a1fec845d2c404bfd
SHA512481bec9d3247f74c45522aeac4dd204f94e06247645ce2262a51ade060ce3f9d36a7e52a4fc7e13288bf39536c1cf0d38552eb9f340b739683cbd4d092102b3d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f501d8dd798b4d4b8f575d341c5b5863
SHA19ba92e78e70e246619cb360113f2f9e740b4e09e
SHA256da7dd0db4a2dbe32e38015f179cb8f2f8367a25db34b4495d485aafd83ca77f4
SHA5128d5d012f3c76ab85cfd110fc4d367f4332620a836aef92e3be87e72e298adf25e4814ffe142a7b49167e19ac8f28874e5eb5a4900892cf98411f9031babd4f66