Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 02:04
Static task
static1
Behavioral task
behavioral1
Sample
61b3dc770e6f21aabbba473f8d31cc21_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
61b3dc770e6f21aabbba473f8d31cc21_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
61b3dc770e6f21aabbba473f8d31cc21_JaffaCakes118.html
-
Size
175KB
-
MD5
61b3dc770e6f21aabbba473f8d31cc21
-
SHA1
153f766b18044fdd29cc518e164e2b650bb5387c
-
SHA256
a8666eb8b12c5bfa2db90d016f992a52c0054e83a38dad958ee225fac0870ea2
-
SHA512
554fc2b85d897ac0417167da0013f0db114b5480c77abef68e68173678fca3f3aa7647ade868d6bde8be6a351c7db77c3432c9d6919db120fdc40a2c605e3134
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3wGNkFPYfBCJiZ9+aeTH+WK/Lf1/hpnVSV:SHCT3w/FuBCJiUB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1316 msedge.exe 1316 msedge.exe 4776 identity_helper.exe 4776 identity_helper.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1316 wrote to memory of 1868 1316 msedge.exe 83 PID 1316 wrote to memory of 1868 1316 msedge.exe 83 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1404 1316 msedge.exe 84 PID 1316 wrote to memory of 1216 1316 msedge.exe 85 PID 1316 wrote to memory of 1216 1316 msedge.exe 85 PID 1316 wrote to memory of 3800 1316 msedge.exe 86 PID 1316 wrote to memory of 3800 1316 msedge.exe 86 PID 1316 wrote to memory of 3800 1316 msedge.exe 86 PID 1316 wrote to memory of 3800 1316 msedge.exe 86 PID 1316 wrote to memory of 3800 1316 msedge.exe 86 PID 1316 wrote to memory of 3800 1316 msedge.exe 86 PID 1316 wrote to memory of 3800 1316 msedge.exe 86 PID 1316 wrote to memory of 3800 1316 msedge.exe 86 PID 1316 wrote to memory of 3800 1316 msedge.exe 86 PID 1316 wrote to memory of 3800 1316 msedge.exe 86 PID 1316 wrote to memory of 3800 1316 msedge.exe 86 PID 1316 wrote to memory of 3800 1316 msedge.exe 86 PID 1316 wrote to memory of 3800 1316 msedge.exe 86 PID 1316 wrote to memory of 3800 1316 msedge.exe 86 PID 1316 wrote to memory of 3800 1316 msedge.exe 86 PID 1316 wrote to memory of 3800 1316 msedge.exe 86 PID 1316 wrote to memory of 3800 1316 msedge.exe 86 PID 1316 wrote to memory of 3800 1316 msedge.exe 86 PID 1316 wrote to memory of 3800 1316 msedge.exe 86 PID 1316 wrote to memory of 3800 1316 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\61b3dc770e6f21aabbba473f8d31cc21_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9272c46f8,0x7ff9272c4708,0x7ff9272c47182⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10212606714281548856,51741151323843878,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,10212606714281548856,51741151323843878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,10212606714281548856,51741151323843878,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10212606714281548856,51741151323843878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10212606714281548856,51741151323843878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10212606714281548856,51741151323843878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10212606714281548856,51741151323843878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10212606714281548856,51741151323843878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10212606714281548856,51741151323843878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,10212606714281548856,51741151323843878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,10212606714281548856,51741151323843878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10212606714281548856,51741151323843878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10212606714281548856,51741151323843878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10212606714281548856,51741151323843878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10212606714281548856,51741151323843878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10212606714281548856,51741151323843878,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2336 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD597d1daea671fa6f540432f19f30033e8
SHA170200a4226eed415e397f6b888784a938221f2e3
SHA25664d70c5fd2721fd8456367bcea1252a489013d8f7cfd7bd03c80b80e1dc1e73f
SHA512531a4e1f95464c097e54a068285386aad2b932869fd9138a92ac728e3c016829b00a202934f8fc6b1105cef768a8389369540aebb37ec8c52b386d9e272b46ac
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index
Filesize72B
MD5053693fe4492cb4976d6861bb83b03d0
SHA1b72eef7254b4192aab618e6272b567b8724e2cdc
SHA256587c0ea30de709fd1712b7721388ca3b741cf2c41f57a7096dde05428eef4c2a
SHA51277d6feff14d9c8e1f942096bea8b05761b845cf585b10990dee161b11134d36bec3514bbf8c53fc4f16a70cb1e3129ff8428da0a49fdaeda2afe06d9eeaef1a0
-
Filesize
2KB
MD5f148bdd2f4dc937a09c12bfcd0b97adf
SHA1c19c73e201e86dfd0e32037adacdfafe7f5f3b93
SHA2569c8989435d1ba6746254ad4812dbadaddcbdd8887e984455bcfbe5f06d6b90f3
SHA512c8a08f371078dad3aa2cc135c3228d6585fc246ba2f94084d797011d4fc950c272d46f53470bad56001f8b8531a965bcb94f23f440972ce2282f7dc8805f1859
-
Filesize
2KB
MD5601a2a45aacedac5a391489385cfaab2
SHA15687c50bdfcef9b6e19f835f8dd158c02ceef2c2
SHA256ab87f0d4e506bd1f1fd6dcba30c6c193e7f673960d83fe203a5410aca1d07830
SHA512e70f0c26830785d6d51b23337df98f77f49c1a44f120840cd1a8a6a52e89a8432dead6bb311b9cc463a845111df2da8962ef0eb4d03b0028c43b28afa53a74c1
-
Filesize
5KB
MD5887464de74d9e718d24a3de684ae2000
SHA18396f6c7ad736aad0f44a8d5ac988471d5bf81ca
SHA25686f11706baf6d64a590b9d165332ee9785031dc6c81871063dfdb6046277ff3c
SHA512cbb83188ca310c67b347c22ca20681a7ecd9a7dfa4e077c23b4f351549db8367a8b46a0fb55f383b50f88b84e9ed1507ae4482d774023e112a4b1ca492520688
-
Filesize
7KB
MD582a3ffcd6d4f516ec6817aa6f7a42732
SHA14c79046fc3869274b9cc30063e3a1764b60072cd
SHA25660fb9d1bd0d7957b95c73521f4f56f3b08c268e4a98cd49441485f113c7e3543
SHA512cade11c2d1d32407a4d20b7b72b48ae2f262fcb47625847d431fae8f5f99dd63fb91b2479c1193ca8d3a281c23fb39364c8f94044956f9e177b5a40abfa28c5c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD51ca9e0a69d8a3493809b4f3a3321eea3
SHA17fcfecee77f5b213e9ac1c0e4eb6e84070019015
SHA25647dcb7f92b442521a53fa1263e598d45d3e7d79b1a80f6ced692d0eb9ad62952
SHA5120fee9f70b2bf85ab11e72c31ff9700f4c9d52e648c242345d5dc7a0587befffa55aa07ae6980db3e4bac9446dffd1e31008e44fd02749c40db0d9ce8361c556c