Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 04:19
Static task
static1
Behavioral task
behavioral1
Sample
908272328d2ba5b7f7dbcda6eb8f9ad7_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
908272328d2ba5b7f7dbcda6eb8f9ad7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
908272328d2ba5b7f7dbcda6eb8f9ad7_JaffaCakes118.html
-
Size
1004KB
-
MD5
908272328d2ba5b7f7dbcda6eb8f9ad7
-
SHA1
70508c4644d9c49037b8b309f8631f6d60d518e9
-
SHA256
b84b741b09554f49ff34b4224eeb657d122390597fbf97ff85d36d9ed2ddeb15
-
SHA512
3b9f1b1c8a9820cd34edfb83a351d6ebd23c0922fbfb211b9d104f07772a9c6a9a4338a6b556f31dec36b5b66c23391ebdcfd248cb78d39ec8cc488f51ecec49
-
SSDEEP
6144:mkcluoYD6tpdw2AMSuqHCTbFOzzUigQiPS5XESP7BMqe05QBCsmrjKgKY:mkclbC6Rw2AMSuDbSyOC2rx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 552 msedge.exe 552 msedge.exe 4724 msedge.exe 4724 msedge.exe 3948 identity_helper.exe 3948 identity_helper.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4724 wrote to memory of 3396 4724 msedge.exe 84 PID 4724 wrote to memory of 3396 4724 msedge.exe 84 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 4756 4724 msedge.exe 85 PID 4724 wrote to memory of 552 4724 msedge.exe 86 PID 4724 wrote to memory of 552 4724 msedge.exe 86 PID 4724 wrote to memory of 4968 4724 msedge.exe 87 PID 4724 wrote to memory of 4968 4724 msedge.exe 87 PID 4724 wrote to memory of 4968 4724 msedge.exe 87 PID 4724 wrote to memory of 4968 4724 msedge.exe 87 PID 4724 wrote to memory of 4968 4724 msedge.exe 87 PID 4724 wrote to memory of 4968 4724 msedge.exe 87 PID 4724 wrote to memory of 4968 4724 msedge.exe 87 PID 4724 wrote to memory of 4968 4724 msedge.exe 87 PID 4724 wrote to memory of 4968 4724 msedge.exe 87 PID 4724 wrote to memory of 4968 4724 msedge.exe 87 PID 4724 wrote to memory of 4968 4724 msedge.exe 87 PID 4724 wrote to memory of 4968 4724 msedge.exe 87 PID 4724 wrote to memory of 4968 4724 msedge.exe 87 PID 4724 wrote to memory of 4968 4724 msedge.exe 87 PID 4724 wrote to memory of 4968 4724 msedge.exe 87 PID 4724 wrote to memory of 4968 4724 msedge.exe 87 PID 4724 wrote to memory of 4968 4724 msedge.exe 87 PID 4724 wrote to memory of 4968 4724 msedge.exe 87 PID 4724 wrote to memory of 4968 4724 msedge.exe 87 PID 4724 wrote to memory of 4968 4724 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\908272328d2ba5b7f7dbcda6eb8f9ad7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f40f46f8,0x7ff8f40f4708,0x7ff8f40f47182⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,9836537879175053162,17350137053671477223,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,9836537879175053162,17350137053671477223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2564 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,9836537879175053162,17350137053671477223,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9836537879175053162,17350137053671477223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9836537879175053162,17350137053671477223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9836537879175053162,17350137053671477223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9836537879175053162,17350137053671477223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9836537879175053162,17350137053671477223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9836537879175053162,17350137053671477223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9836537879175053162,17350137053671477223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,9836537879175053162,17350137053671477223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6256 /prefetch:82⤵PID:180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,9836537879175053162,17350137053671477223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9836537879175053162,17350137053671477223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9836537879175053162,17350137053671477223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9836537879175053162,17350137053671477223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9836537879175053162,17350137053671477223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,9836537879175053162,17350137053671477223,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD55ee1fd0d94d763548f11d478f5d127a9
SHA1976b6ca6045142de722808857cd390883739b868
SHA25600c07b04b9db86ef9ed14bf43f7ec4f679d2dae4f0cadcec331272138d75f35b
SHA51296c53df8bafca6fbeb497bc54ed1c04df03b2e652785066a1a196868ef1b24207f842e8f8f541c32076ffaf14d175b9090d757a495c3b64dfea488a13c9158c8
-
Filesize
1KB
MD560ad22802ddfebea09ece742996ba62e
SHA1a74b217eee046f4684824641bce7c64073b96beb
SHA256e4dc174927d442c27221341f10e5590bdef6b87c26af7aded3090e89ae5f057d
SHA5129a05879fcbba734839d49355062804802835c3151b26689ff0070185a50465025b6f73bc6a1bc34e30193029bc5f789fdc8e4c591ee9a19223d16edabf7f3f54
-
Filesize
6KB
MD5e51b5141a71fc04c8bcf02052a015522
SHA13639bf5319ef6ead002cf96b0779230139bca18f
SHA2565447a5a0466b49ffc534db5aa57221e39c76b25f4a34bbe500486b35708b7d82
SHA512dbd817b109a9fd560e244199b196b049876d7811ca97ef3612bf48dbddf11dcb9ae36b4f715bfd6dabbd14f58c92b58852ddcf2b2e191374355d4ddcd0fc0453
-
Filesize
5KB
MD50fdd08cd6a209b1829fae44245e4bfdf
SHA193ba926c10324a276a7f7348ce8dcf711009ee5c
SHA256ddb63354b8b5a1ca712de2877f6bad59af6bf89ea1735a05909128c881dace4b
SHA51242422f174d6a052ef960bd20bcfe0dad5738bd6319d6393f477600b6fbc210840ad21c04f9f3e6ac12aa8af3c7e47fd954c0441b1ec2b06ed7e820c56ad0994f
-
Filesize
6KB
MD5937b72079ce1bfb79d4e966a21fa5612
SHA15d6fa68c5aa4632908529b04336ef1859926bd22
SHA25695513f7001334546013b1079be5babeb7ad1eb163be095a9a32e370dc273674d
SHA5126ddcf10fef0688b862e24c244af0c7e95fccd8e6eeff8ba6aebbf85a5dc4bdaefa82aacfb9ac706053ad96f519b7ba54bf21e111225d4f5c1200493744ba46d4
-
Filesize
6KB
MD541f3acb9fc53b59cda45df85123cda10
SHA1b88681e0ca0105b475f5edc9a4a8e1c1dd86c60a
SHA256fb1ac11dd58201cde86f79c1896ce632c0cdaf8cfdf497f2ec88b80d233d75d9
SHA512618946dd5b1f42d4b49ec5f56230bd4f50b95001dd3ea86c6df29ba1f9878eb9f5a4bbfdb9ec1fc7347150837375d48e02cc88f5aecd340d5df2e81ebdc09a39
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD595031d1db1c7e04de18e55aef1818caa
SHA16de6906d860ff4617dc275a2fd33632e8a6be24a
SHA25661e0f271db0e05584c70c3ba9240f82f90f536dae6d626d23d4c7d8062107427
SHA512da45834c14dd6a09127436a45ceabc7547548ba6690282aa3c8a397e6bf432a8138090a0fb21cb5e4c797726f05c30587c775545c0a6388d404da5b263f75f4a