Analysis
-
max time kernel
142s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2024 04:05
Static task
static1
Behavioral task
behavioral1
Sample
99ede8d4efa5ba8f63e970dea6595cf6_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
99ede8d4efa5ba8f63e970dea6595cf6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
99ede8d4efa5ba8f63e970dea6595cf6_JaffaCakes118.html
-
Size
232KB
-
MD5
99ede8d4efa5ba8f63e970dea6595cf6
-
SHA1
a2bbe190ea0aa00eaee138d383d32127a388fc90
-
SHA256
88403aaef55c4c9000a74f10837c15ba5b40ed9ef6b5d5d2e611681ce01061c7
-
SHA512
055634baae6902915ab45076f760d4ccf9c603b427e5fd118a5f8cb4d4d206b98d3a1cb585261f08a70f542a4062a1e5b5d6281f6a069b14697b810e2a5b25ac
-
SSDEEP
6144:qmdb9DzLBl5QFXHa8oTwiszMj2nW8GJ8G5QJDzf:fbNll5QFXHa8oTwiszoEJX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 652 msedge.exe 652 msedge.exe 2060 msedge.exe 2060 msedge.exe 5052 identity_helper.exe 5052 identity_helper.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2060 wrote to memory of 948 2060 msedge.exe 83 PID 2060 wrote to memory of 948 2060 msedge.exe 83 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 3952 2060 msedge.exe 84 PID 2060 wrote to memory of 652 2060 msedge.exe 85 PID 2060 wrote to memory of 652 2060 msedge.exe 85 PID 2060 wrote to memory of 3948 2060 msedge.exe 86 PID 2060 wrote to memory of 3948 2060 msedge.exe 86 PID 2060 wrote to memory of 3948 2060 msedge.exe 86 PID 2060 wrote to memory of 3948 2060 msedge.exe 86 PID 2060 wrote to memory of 3948 2060 msedge.exe 86 PID 2060 wrote to memory of 3948 2060 msedge.exe 86 PID 2060 wrote to memory of 3948 2060 msedge.exe 86 PID 2060 wrote to memory of 3948 2060 msedge.exe 86 PID 2060 wrote to memory of 3948 2060 msedge.exe 86 PID 2060 wrote to memory of 3948 2060 msedge.exe 86 PID 2060 wrote to memory of 3948 2060 msedge.exe 86 PID 2060 wrote to memory of 3948 2060 msedge.exe 86 PID 2060 wrote to memory of 3948 2060 msedge.exe 86 PID 2060 wrote to memory of 3948 2060 msedge.exe 86 PID 2060 wrote to memory of 3948 2060 msedge.exe 86 PID 2060 wrote to memory of 3948 2060 msedge.exe 86 PID 2060 wrote to memory of 3948 2060 msedge.exe 86 PID 2060 wrote to memory of 3948 2060 msedge.exe 86 PID 2060 wrote to memory of 3948 2060 msedge.exe 86 PID 2060 wrote to memory of 3948 2060 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\99ede8d4efa5ba8f63e970dea6595cf6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bed246f8,0x7ff8bed24708,0x7ff8bed247182⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2292,11784097853475547407,17674546334701281451,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2292,11784097853475547407,17674546334701281451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2292,11784097853475547407,17674546334701281451,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,11784097853475547407,17674546334701281451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,11784097853475547407,17674546334701281451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,11784097853475547407,17674546334701281451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,11784097853475547407,17674546334701281451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2024 /prefetch:12⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,11784097853475547407,17674546334701281451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2032 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,11784097853475547407,17674546334701281451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2292,11784097853475547407,17674546334701281451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2292,11784097853475547407,17674546334701281451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,11784097853475547407,17674546334701281451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,11784097853475547407,17674546334701281451,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=212 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,11784097853475547407,17674546334701281451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,11784097853475547407,17674546334701281451,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2292,11784097853475547407,17674546334701281451,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a9a9b91b7ab0045067213899d23a1d43
SHA171dfe127a9e3c9f109ba40e0b1a762794516099b
SHA2565151a1aa055db67b9c003b64ad9e43a8860635ea2eabad47edfcae0359ebea61
SHA512804615154ce87d1769392b38c26d8d7940bbb828ac98570d31b94d2f3afc1aab2595d77c3430787b339c13be1506dfb06cf8e0618d8c00bc9f36df551886b523
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
1KB
MD59e9d32e286e324b7a5afdb412e53ddeb
SHA1ef6b28b3c997238233e33d2625b1abb4cad6139b
SHA2569b953a2a1426a3dd749532566b6b385d90fd26e9cfb8a6482351ae8fc9767b98
SHA51207401233910f4ec395200c61bdf61a0bd7cba678250007bc99ea932b92d722d960ac367a7070e6b27c29946bec3a973828b6ecb2dda8a84b4c32a52218d06385
-
Filesize
5KB
MD50f16f444a427755cabee119dd39bcd19
SHA1bac2e2186918a33789989236ae5d30ef24fa41e1
SHA256a2c39d883fac3562a20e65ccf88ec4e8a297e974bf02b7548961af166830c4a6
SHA5125c5343767e3ccc6416bdb2fe38c32740ffd13dfefb2d9c0cd17f08874fd64260730226c5e0c95c8e616d0ffd36b709aec4abc9c9baf58623d642e5ac6bc4483a
-
Filesize
6KB
MD550c9659d9d38a1ba9fe312b24909a744
SHA12f33ff5f9a9d0ce972781ce533a2c325efbcb95b
SHA256f66a4f2a66b67a8130232c6b4aa5a9231aed8a7b8fad7a493f22cf41491759cd
SHA512fe56b412d496249b779181b53300d308ec4351598dd629fa611a9533ec9442283d5a5188e3b2f2ed581dc269bfcd42a6c95283426718c5c7997abefb5954feb4
-
Filesize
6KB
MD5337c42a449ccf160b5e77a2ae0223b28
SHA1649eff9c60699704eca8544e40b91184e901246d
SHA256467e64a6db1d6addd402f1826ce4bda07602e0b884d6e5d17f2f6d9fea1e560c
SHA5122fff516be14eb68a66c94ac8dd64b1f45744fa6323534f0e2b37e60a35bbe5c060e256d5295f04d2b55e684bf8295f55086edb3e63f0c44d48237bc1738d39f6
-
Filesize
873B
MD5137d4633c7fd018a94edb35482410ca3
SHA181ccdb592d4d44ea8828b66330da556f11e1edc4
SHA25661ff3559910b4f2be0735dc72750794d1c8c53ecc2a82d1f258b1a27c90b2e20
SHA51276c4bd033cf7325821298f19286c617ac163c34a4888e37fb946556b54a6f265709f9178502607a50a9dcf5137a4cd038e2a62ffe31e12dce5aef9012453439b
-
Filesize
706B
MD58038ee652414ec35242264e6d97bc788
SHA102876554d75d726721c3306981a12f7a67b21b24
SHA256b5b8429fb00bdabaa2a275b42c8d5918389f54c1d18ada6e2e6111da3325d68e
SHA512299d7b18d08d973c2a61fb0a9139675b5e60c90c3454d5ffd3f2aaa614316dc4011ade3d8b44fa3441dbb516c037279ea973427acd1f57543ea7df066d05746a
-
Filesize
706B
MD503218d113a378a2a401e761a5ac13e80
SHA14decbfdbd868ada94c7813f107d23d4ab3819de2
SHA256a4dc16d6f429ffe446610adc39b8c705adcb686b61741a9a40f9b3e1f9e74f9b
SHA512ea29db906e48138ccfd7ba5d64cdf4f1f8cf600c05bd9b3f1a315b306ee938dff86df7891697c79c2cd6e054d3bcab1cf3e834f379241e92022769a81f7a7673
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145