Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 11:16
Static task
static1
Behavioral task
behavioral1
Sample
45ea4b348488ef1072d6f1661790b22f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
45ea4b348488ef1072d6f1661790b22f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
45ea4b348488ef1072d6f1661790b22f_JaffaCakes118.html
-
Size
372KB
-
MD5
45ea4b348488ef1072d6f1661790b22f
-
SHA1
5d746bd969e74f4b608ac7a3d7a0045300ab11ad
-
SHA256
7af9ed90aa22c90b27fa4d5602c3bae52e09d12fbdd48f0be722310abccd2655
-
SHA512
e246b8dadc5fb91bcb967e4ba6cdb80d2b087a2471e99437819326258c03f92b2dac0c1f1729a8bfc346740c87a9f35526084bd802f376b7544c0f5a23faf09f
-
SSDEEP
3072:Sdj7ExX/YPDJRDAmmKpbCPATEzfgVtd4bfdpdm5eE3bpYVXLt9aEKpbCPATZAY0D:SO/nKo4VUfdpdm5eEra9fKXRQuByc3K3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 688 msedge.exe 688 msedge.exe 116 msedge.exe 116 msedge.exe 4292 identity_helper.exe 4292 identity_helper.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 116 wrote to memory of 2064 116 msedge.exe 82 PID 116 wrote to memory of 2064 116 msedge.exe 82 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 5104 116 msedge.exe 83 PID 116 wrote to memory of 688 116 msedge.exe 84 PID 116 wrote to memory of 688 116 msedge.exe 84 PID 116 wrote to memory of 5016 116 msedge.exe 85 PID 116 wrote to memory of 5016 116 msedge.exe 85 PID 116 wrote to memory of 5016 116 msedge.exe 85 PID 116 wrote to memory of 5016 116 msedge.exe 85 PID 116 wrote to memory of 5016 116 msedge.exe 85 PID 116 wrote to memory of 5016 116 msedge.exe 85 PID 116 wrote to memory of 5016 116 msedge.exe 85 PID 116 wrote to memory of 5016 116 msedge.exe 85 PID 116 wrote to memory of 5016 116 msedge.exe 85 PID 116 wrote to memory of 5016 116 msedge.exe 85 PID 116 wrote to memory of 5016 116 msedge.exe 85 PID 116 wrote to memory of 5016 116 msedge.exe 85 PID 116 wrote to memory of 5016 116 msedge.exe 85 PID 116 wrote to memory of 5016 116 msedge.exe 85 PID 116 wrote to memory of 5016 116 msedge.exe 85 PID 116 wrote to memory of 5016 116 msedge.exe 85 PID 116 wrote to memory of 5016 116 msedge.exe 85 PID 116 wrote to memory of 5016 116 msedge.exe 85 PID 116 wrote to memory of 5016 116 msedge.exe 85 PID 116 wrote to memory of 5016 116 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\45ea4b348488ef1072d6f1661790b22f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea6b046f8,0x7ffea6b04708,0x7ffea6b047182⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11316227550153036964,15211701239665437964,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,11316227550153036964,15211701239665437964,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,11316227550153036964,15211701239665437964,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11316227550153036964,15211701239665437964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11316227550153036964,15211701239665437964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11316227550153036964,15211701239665437964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11316227550153036964,15211701239665437964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11316227550153036964,15211701239665437964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2724 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11316227550153036964,15211701239665437964,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11316227550153036964,15211701239665437964,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4020 /prefetch:82⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11316227550153036964,15211701239665437964,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11316227550153036964,15211701239665437964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11316227550153036964,15211701239665437964,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11316227550153036964,15211701239665437964,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1596
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2480
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c658c287a5e84514adab0f78222d50d5
SHA1bda2f98a75dd313668e4ebfd77dbaae582506d2b
SHA256ed5c13b0443da5aa4d02127e800cc1af56a8397a0994badaa2d4a50af14d7d88
SHA512b4c42b53f9803f6cf939952795da9730448ae4b833f1e236c3e350875cfc0a4886c5003c60263dc0aa82b527ab7856a8ef0839511ba4aca36f5b6fbe9b42b146
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
32KB
MD5f69ec88aaf8e4e6c8757a523eca2a6bd
SHA123c42b75e088886466fca7dc0295d0e3ff20568c
SHA256a8ac8c6c9cae5af31953ff6be9933f5317856ed2305a921928ce21f87958f43e
SHA5122b08955a87cd41a5cb97673eb086bad6049d388131813494f551d97ee95d5899a4dc4f9f3820f9a56c759cccf442ceda2c14eb10be440015aebb59cde48d5aa2
-
Filesize
233B
MD59a04c7380d1787d31975bd3bf29c71f0
SHA10c5fc2d7c3de54de4f2f7603f8eff1f757fc6d81
SHA256feba69c870c624168913f9a71b199b701a53b78bf54c673794f90b4853b7e42a
SHA512fd4885854d57fe091ea1d00e0aa1b6dd8b4c4bf7d68a4a77f235ccf55c1cbfbc5833d18ea1c2ad2d76c1c056119942d255aa8e3ec81247c09952c27e44f6f7ad
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5d3da621619e9f7c38d85990c0416e830
SHA16a9d112005326018419d5ca4cc089e8a247201bf
SHA2563f7ac07a24510b0b92344025814bef95a3932f384dfb772ca72d20bb82e0a5ae
SHA51288568797a1f54b9b64f6faebfe7e1dcd1f244da30b4db17e162b7bc6267db36d9d5a96bc75f4a2d443abbf505aa9c890393dce758c8bc6747561a94f70b28ce8
-
Filesize
2KB
MD54ef5259e6dbebe239d98d85e710d0a66
SHA102302df175377a41de7be3b809dd0032f93b95c0
SHA256d553c41af4b568bef6c680b625a382c2d75f70387542fe1930d4aca855e6bdff
SHA5125e809005d4e7f16dc8fb44547e1a527f0b0e3bf0a0418b0ee0166bbc0639b7b7f2576f1aeac2ed62de205bee86240410a7d46236f4d6b99ce33cbb085864b0a4
-
Filesize
2KB
MD5752d963ba5938ec3ff9d44285b075a15
SHA18d2e01d7634125814b3296088a72e0d3b0e51267
SHA25641e3f211a63b91df365b232b280fef4884daf516ae3def6c82ced3042853c1f8
SHA5127cac9e085cdaa560e359074ebb0d185e33733ca8b9579bb26d29158c67f80afcfb8f388b0c22aa232de595fe6ebf9c5f6b1119ec259607132b68b4738371b123
-
Filesize
7KB
MD5f5be51c5f721a4643284fc84d586e26c
SHA15d86a369b8006c9427c9fc398dd3f66fc1861082
SHA256de24f22b5379d1ca9ff596159fe9a732672523535bfbdf8a234f4e75375d6dd4
SHA5126582f7d9cde717b5095d32262f93f1f6de47d2af5a00d0e985089958d965fb8c5987308385cb5730532af5289778a792f59e8c82d637c313ca2bf6e57d74fecf
-
Filesize
6KB
MD59b90e55b9594aba29ab0cb8bc50a1d6c
SHA16918eefc6aa60aee6038ef69c4a0eb25092dc042
SHA256c0cd67edd769c24994666f2e93e32300ac5b92b207c48ece85d8eeb1695a107e
SHA512a66e7b3a79af7dd1e2d5f631c9781943e830fa344155e80d63eab00dfaf320cfc8d2dde1fc6aa8cd10979c407d55b551bf8af0668cdd21f57ef8e9c4a84872dd
-
Filesize
538B
MD58b018bcf836cf37ef860640385f4db14
SHA1c0a1b37a7075498e9fd135eb15766f2f5fe14d51
SHA25618d1c7d342acdd8cf34091054565fe1b80dae2eb21093afffa0c9dc90668121b
SHA5122199b79ec615dc0d3492a26a7750e0ad877a16ec4f8085a68f6cdb3551ba37722ca02b1529e385fd273e9dfd5b782b93147558ff83ca4990b34ba2536ae64eb2
-
Filesize
538B
MD5b2fef470eceabd29389e08e50e037451
SHA19d11307c15dd0cd22bf58ad7b60248141e815746
SHA256a86ae6732cd403a47525674ca8fe9b12c9fbd356584ca4fdfbe4f00c7fbd162f
SHA512bcb07be60500547034efe9f78a14c5ce2a91411287813a1cbc66ef54c626935aeda90fd1a82d42728e9662cd201e966b60b6de7ea763805a2cc59d7a292bb290
-
Filesize
371B
MD5bda3107985399e82a680a7d47865f894
SHA11b985111289f243dbbb9bcf7496d34a2f26eb800
SHA25677a672a34b36be85d433d69b0e7d3ec3b9c811018e674f90eeaa8d94bfe8617e
SHA512924c24c0136fe20fff2a67e69ac6eb2bfd0162f13ad0bbafcabd3cb807dc3195063fa443598286d0df57ced290fc4d6eb444e528320b4f0d1841a788588c9a3f
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23