Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 12:00
Static task
static1
Behavioral task
behavioral1
Sample
91b5d1839a6ff7713b711d9e5d6e01d1_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
91b5d1839a6ff7713b711d9e5d6e01d1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
91b5d1839a6ff7713b711d9e5d6e01d1_JaffaCakes118.html
-
Size
257KB
-
MD5
91b5d1839a6ff7713b711d9e5d6e01d1
-
SHA1
f1a21ff178c55e05b8a02866e1c917b38b02bef8
-
SHA256
9a5de793b45afb6c45f8f97dff446c3c468df47e90a31c9f11fdcc42ed32a314
-
SHA512
90dc3b572d7ee01ecd034fb19b5629672283bf17cdc56dd6de6cf1639124011c67514d4dee9b0bb6563ae700f3e1242da7f3ccf92d7ca0346ed8ddd2e621aaad
-
SSDEEP
3072:3mjlBWcQTHAdKZxitje0k9Y19Y//JreO0NrIFod6hiO+Mgb4oKntMnl8LZ:3mjlIfiEzFH
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 43 sites.google.com 54 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4264 msedge.exe 4264 msedge.exe 208 msedge.exe 208 msedge.exe 3216 identity_helper.exe 3216 identity_helper.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 208 wrote to memory of 60 208 msedge.exe 83 PID 208 wrote to memory of 60 208 msedge.exe 83 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4264 208 msedge.exe 85 PID 208 wrote to memory of 4264 208 msedge.exe 85 PID 208 wrote to memory of 1888 208 msedge.exe 86 PID 208 wrote to memory of 1888 208 msedge.exe 86 PID 208 wrote to memory of 1888 208 msedge.exe 86 PID 208 wrote to memory of 1888 208 msedge.exe 86 PID 208 wrote to memory of 1888 208 msedge.exe 86 PID 208 wrote to memory of 1888 208 msedge.exe 86 PID 208 wrote to memory of 1888 208 msedge.exe 86 PID 208 wrote to memory of 1888 208 msedge.exe 86 PID 208 wrote to memory of 1888 208 msedge.exe 86 PID 208 wrote to memory of 1888 208 msedge.exe 86 PID 208 wrote to memory of 1888 208 msedge.exe 86 PID 208 wrote to memory of 1888 208 msedge.exe 86 PID 208 wrote to memory of 1888 208 msedge.exe 86 PID 208 wrote to memory of 1888 208 msedge.exe 86 PID 208 wrote to memory of 1888 208 msedge.exe 86 PID 208 wrote to memory of 1888 208 msedge.exe 86 PID 208 wrote to memory of 1888 208 msedge.exe 86 PID 208 wrote to memory of 1888 208 msedge.exe 86 PID 208 wrote to memory of 1888 208 msedge.exe 86 PID 208 wrote to memory of 1888 208 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\91b5d1839a6ff7713b711d9e5d6e01d1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff810c446f8,0x7ff810c44708,0x7ff810c447182⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,12301927029536084774,9573564920450321102,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:22⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,12301927029536084774,9573564920450321102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,12301927029536084774,9573564920450321102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,12301927029536084774,9573564920450321102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,12301927029536084774,9573564920450321102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,12301927029536084774,9573564920450321102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,12301927029536084774,9573564920450321102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,12301927029536084774,9573564920450321102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,12301927029536084774,9573564920450321102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1292 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,12301927029536084774,9573564920450321102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,12301927029536084774,9573564920450321102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6388 /prefetch:82⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,12301927029536084774,9573564920450321102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,12301927029536084774,9573564920450321102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,12301927029536084774,9573564920450321102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6448 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,12301927029536084774,9573564920450321102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4500 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,12301927029536084774,9573564920450321102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2056 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,12301927029536084774,9573564920450321102,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1596
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD56dda07e1183df0c1861ccc15de8e4852
SHA1409914277d476974251af5f4d4fc5173e6101df5
SHA256cf2d7a8c138786b1778bfd437695cdb98db78f67850ea45317526fa7248343f2
SHA5128f08ed40a137b52900b4d17cd102515efe2f86237415d1ea9697c041fd3f614583ce981104e90a3de4c63791638b1468aa072f5dc6b2cfdc733da02928f3c54a
-
Filesize
1KB
MD53202e640035190e0f7a07a8048a393c5
SHA1d178bb5799ee02a3f24027f9ff503775161f5cf4
SHA25648f942a21ef8f8455e02e4d3d787d66416c86463e304add31aa22128faf571c3
SHA512c18267671c1ad20d1b7e599634d60b8fc57681c1381bb3568303b02fb978b51b9ca7a574e92b0db441dfba8e8a116597cab53299404e605b6b4b720bb08ef49f
-
Filesize
5KB
MD58ae79f94b58af07ffe022aa76deb6dc2
SHA149cec7f740732636958bf5dae6d4aa4008e6d8ab
SHA256ea3d285abcc8876059ef7371dffc3a642da8b7215fe6853637d22f8d22843ccb
SHA512407d6875d8d5b572c792bd1c8444a778eb7b89d14a0d9b59bd85d7190ade5cae4a3b1f6b64c43916a6e9a43dcb424ac735b69784676e103fdaee5c3b9f6085aa
-
Filesize
6KB
MD5fb90be28b8a2ee6d05a4a1ac0d9799ad
SHA15d98a7654fff7e60152ee972ef8c11a2e352c134
SHA256934874ba1700977decdbd39c91dd362620c75c6509dae6989c8c9bfa1c5d5c49
SHA512e7f1475e227752e83f3554f26478ba32d245dd23258d6d374f0efeb41ceaa3697e8d12579cda28865b82576de8c4d1c36e0f70cfad3c030fe578cf61511e9d53
-
Filesize
7KB
MD5f67db64df255276b82377a346342a8eb
SHA11def5695b68d019edb63c6632f1384d8d594b949
SHA256605866d5bcdb8014f25602712d1f3797195ecf5ada4ba2edc370616220bebde4
SHA512e3b37910d5aa3abc0ce95442993f7674d7981a2cb80c3b4e7d10592b74437224f23dcd34c1ecc87069321c606ba59d7632fe96a5b70f9a142b5818175d93c7b0
-
Filesize
371B
MD53aa25988763127e01dd94f002c765887
SHA1d9a7a2c14c40d3d1d83f994611700354289e9374
SHA256aa87d3926273f3399b934bcf7c0a8c70f33aa51e50f8f5624891f8c511a8654a
SHA51273c7f8b503a84503065a22a9046b83cad2f9d3f2389a9ea1029826e642b36c8fb4013e174d48857a085074713994d05909513dc3c3d730fe2438ed1f8aaa9269
-
Filesize
538B
MD576ac93c2941a799a0ad944a93a2abb78
SHA1c5d1aa975a0422a1f4f98ce4f67784bc6304522b
SHA256ddffb9bcc8696ab007a0b9199274a43f79df884cf3d7c0eb0eebae06ccf82d9f
SHA5125873f9a41254d28cf7d3af61be594877cbba585dd122a0494974a4277960c3549f895a0d2c66f997b11718c628528f68c5efad8cf1a5bdffeeaa458958c921da
-
Filesize
203B
MD5138023a7aa1f044d7fc99df121ce5b4a
SHA10febda09b18625e7814b4474f1dd5eb7d3a15743
SHA25669f50e825f11e505f720e49e347096b2676db3e0030330a54df1e14df7558e7f
SHA5126c902354b423d03ca9358d9b636fea53119277c3d8fa3e031b598dd46b172873656a4effe145323ec92cd3735e976f4642d21b5ee92805058075314f03dec4c1
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5af83683444802d48cab6a880cd75ad44
SHA11de9ea72fe5be9a77d018c32d2b951f23b759a7b
SHA25670ca8f02bb222f95b27a93e1364c2aab2e0d68fb316e4e9b52d4480edd864cc9
SHA512192520527baac73632a6ed0f2b1a0351959b2eacca02345a9a79ebe489a933b83c2c0bd53ea03f83245e2984e090984dfe7f4e0995241c652cc12f5ca3e480e9