Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 12:03
Static task
static1
Behavioral task
behavioral1
Sample
91b780ae88cac81a2e2e4f06fff62210_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
91b780ae88cac81a2e2e4f06fff62210_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
91b780ae88cac81a2e2e4f06fff62210_JaffaCakes118.html
-
Size
175KB
-
MD5
91b780ae88cac81a2e2e4f06fff62210
-
SHA1
305cab5836d171a6cf617975fb91790499325695
-
SHA256
9e4e53943af71c7842415686e064fcfb0a9efc1f033b9aaaefc1eae9aed5e92d
-
SHA512
9531d50d3ebb5e4e4b170e2c9e615622caded37132c24f084e340ab392108015ac57430353cfcfed2aa1f36fbf4f8859b2efe7a7e4f3b8c71296a84d3fb98608
-
SSDEEP
1536:SqtY8hd8Wu8pI8Cd8hd8dQg0H//3oS3fGNkFdYfBCJis8+aeTH+WK/Lf1/hmnVSV:SBoT3f/FYBCJiCm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 3076 msedge.exe 3076 msedge.exe 1876 identity_helper.exe 1876 identity_helper.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3076 wrote to memory of 4768 3076 msedge.exe 82 PID 3076 wrote to memory of 4768 3076 msedge.exe 82 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 3488 3076 msedge.exe 83 PID 3076 wrote to memory of 4600 3076 msedge.exe 84 PID 3076 wrote to memory of 4600 3076 msedge.exe 84 PID 3076 wrote to memory of 3152 3076 msedge.exe 85 PID 3076 wrote to memory of 3152 3076 msedge.exe 85 PID 3076 wrote to memory of 3152 3076 msedge.exe 85 PID 3076 wrote to memory of 3152 3076 msedge.exe 85 PID 3076 wrote to memory of 3152 3076 msedge.exe 85 PID 3076 wrote to memory of 3152 3076 msedge.exe 85 PID 3076 wrote to memory of 3152 3076 msedge.exe 85 PID 3076 wrote to memory of 3152 3076 msedge.exe 85 PID 3076 wrote to memory of 3152 3076 msedge.exe 85 PID 3076 wrote to memory of 3152 3076 msedge.exe 85 PID 3076 wrote to memory of 3152 3076 msedge.exe 85 PID 3076 wrote to memory of 3152 3076 msedge.exe 85 PID 3076 wrote to memory of 3152 3076 msedge.exe 85 PID 3076 wrote to memory of 3152 3076 msedge.exe 85 PID 3076 wrote to memory of 3152 3076 msedge.exe 85 PID 3076 wrote to memory of 3152 3076 msedge.exe 85 PID 3076 wrote to memory of 3152 3076 msedge.exe 85 PID 3076 wrote to memory of 3152 3076 msedge.exe 85 PID 3076 wrote to memory of 3152 3076 msedge.exe 85 PID 3076 wrote to memory of 3152 3076 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\91b780ae88cac81a2e2e4f06fff62210_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ff86ae746f8,0x7ff86ae74708,0x7ff86ae747182⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13997041563371942631,12467100722853726619,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,13997041563371942631,12467100722853726619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,13997041563371942631,12467100722853726619,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2424 /prefetch:82⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13997041563371942631,12467100722853726619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13997041563371942631,12467100722853726619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13997041563371942631,12467100722853726619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13997041563371942631,12467100722853726619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3784 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13997041563371942631,12467100722853726619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13997041563371942631,12467100722853726619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13997041563371942631,12467100722853726619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13997041563371942631,12467100722853726619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13997041563371942631,12467100722853726619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13997041563371942631,12467100722853726619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13997041563371942631,12467100722853726619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4516 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13997041563371942631,12467100722853726619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13997041563371942631,12467100722853726619,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3264 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3440
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
46KB
MD5f871dd44ae8c9e11c5c85c961f8b2ab1
SHA17618910822a0f2639b405e3c0b13faff0431140a
SHA2562ae2564f74716a4e44850d845f0cca255c6c0c3a7dc0c8ee6bfca0212cc394ec
SHA5123b9638f705f83e37c3e0c9db1205b2ac76b96ba72ac56013a6aca6f34a7a9ff3548e8fc67d2b85c9f23f8337f696baa8fab01523fb04b5fd618b130501eed47c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5c5a772317e99df1220c81b3c515a9633
SHA1b8ab821db6f4f80da59381c0c25cb0b2ffafcbdd
SHA256e395a7f189944fcb31a2db256d29dc81a665f7cd02d2e2d77a07a70670d56f76
SHA5126fc4f768e664105f9e08708946299c43638e5df8b9a96ff8e886add3c434aaa16e84f4b9bfcaed50e8370bf16fcc2205f5c821cae7b41a7ef28e44f00442d368
-
Filesize
2KB
MD527fe66a1e6e6184af1c11340d5958471
SHA1c4b2e0f45dc6f934d593f7c43699ffa6823fa318
SHA25691a1dbf1a5322d2bdf822554757da2c742b30b8204c6d55480370212bc5f8cce
SHA512c05f0dbf365bcf02e62a77a03b54c29ee9fe6163d9ea139a69b4f74bd09d26ca65929994c00f9ff12f4aed0f4541f66b9d4b965918b204ec8961f13d797dbc0d
-
Filesize
2KB
MD5dc52879e2ee6fcab61b624184c5a9b27
SHA1f7ca2d8616cd04fe0d804781d8710fc6526a59c6
SHA256b5969de508f4f13874deef0c204e92cf907c97da85b131e8427aa454ebc156ce
SHA512c4f7a355060f43e469439a385b7cd11d7308b5dca46920d81409a6de474e9efa8f1283c447167c12fd06622f563ebbc5f6b750a45ca1ee6ae571de479dad2af0
-
Filesize
5KB
MD54328f238efe0d168385202cc47696519
SHA1cc7be842a60d25951fcad99448e2495cb0754fcb
SHA2567248674933033cd015120058bc49ff30a9be06731c504e2434efc4886919a7d3
SHA51272955f5565a52435101bfb631abe9a1b6eb208ea9ceab78c6dbf9fb7e7c39be0735b3f35ef1efaad7ca5379d06a8b5bd189f9ef97567cef9eb94b56e48d56308
-
Filesize
7KB
MD5d1a6262839941fda9499d99246616a16
SHA1bc07fdc6de58ae4f149895de6f9a5c21980a6fd8
SHA2566b257d6b1d8af28d63e280e077c39a57e13ce41e2456b9f9c308a1133737cacc
SHA51237b44e03f1d3280608a669f3c5582e301f7812ab648ec8bbfa80bfc15a2d5a33defcfcfacc21ec042147294472167a6954b2736bf158d3078363deaf4f135e2f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5ad65176fd025b063bddd500e986adb63
SHA161a99a43cdeef645e8efe367754939d6e189b16d
SHA2561281d829019be3264e2d461e3c7cc5382c8d2d78a128132c61eb3df9b634c79a
SHA5129ddeb1fafc7bd556e7aa7bc9ca6b0b55f56c6f75e5ff5e6f98f33e7fc8f2646d1e59e09a3e1361db27f817d48ea06dab956bd062075fa518d26621881bba868c