Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2025, 00:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4029c6489194649ef6fc6e60aa8d2d43.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4029c6489194649ef6fc6e60aa8d2d43.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4029c6489194649ef6fc6e60aa8d2d43.html
-
Size
139KB
-
MD5
4029c6489194649ef6fc6e60aa8d2d43
-
SHA1
a865d70ca4c3360668ae0e4e64eafbd43d35669e
-
SHA256
eba90184860456f18c59ff1e3d0bf56d01b3a1ec3f68e68e9d96dc238d2a0d20
-
SHA512
8e179779145d960f9e24d9a671241b37cfec5654f8be51a6e320f7fbfff51e5b86017ae9e8c355d8980b2fc43e18f1533e933fcaa4eb7da026e30f9cc5e61aa6
-
SSDEEP
1536:GuWpIdjX24v45vj0aQS0Nxy6KUYOoxw/oPtv/+3:G8t2u2DQXNxy6jYOoxw/oPtv/u
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4624 msedge.exe 4624 msedge.exe 1808 msedge.exe 1808 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 3656 identity_helper.exe 3656 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1808 wrote to memory of 3404 1808 msedge.exe 82 PID 1808 wrote to memory of 3404 1808 msedge.exe 82 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 752 1808 msedge.exe 83 PID 1808 wrote to memory of 4624 1808 msedge.exe 84 PID 1808 wrote to memory of 4624 1808 msedge.exe 84 PID 1808 wrote to memory of 4748 1808 msedge.exe 85 PID 1808 wrote to memory of 4748 1808 msedge.exe 85 PID 1808 wrote to memory of 4748 1808 msedge.exe 85 PID 1808 wrote to memory of 4748 1808 msedge.exe 85 PID 1808 wrote to memory of 4748 1808 msedge.exe 85 PID 1808 wrote to memory of 4748 1808 msedge.exe 85 PID 1808 wrote to memory of 4748 1808 msedge.exe 85 PID 1808 wrote to memory of 4748 1808 msedge.exe 85 PID 1808 wrote to memory of 4748 1808 msedge.exe 85 PID 1808 wrote to memory of 4748 1808 msedge.exe 85 PID 1808 wrote to memory of 4748 1808 msedge.exe 85 PID 1808 wrote to memory of 4748 1808 msedge.exe 85 PID 1808 wrote to memory of 4748 1808 msedge.exe 85 PID 1808 wrote to memory of 4748 1808 msedge.exe 85 PID 1808 wrote to memory of 4748 1808 msedge.exe 85 PID 1808 wrote to memory of 4748 1808 msedge.exe 85 PID 1808 wrote to memory of 4748 1808 msedge.exe 85 PID 1808 wrote to memory of 4748 1808 msedge.exe 85 PID 1808 wrote to memory of 4748 1808 msedge.exe 85 PID 1808 wrote to memory of 4748 1808 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4029c6489194649ef6fc6e60aa8d2d43.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3a5946f8,0x7ffa3a594708,0x7ffa3a5947182⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,1746283130309077439,17014863821430222934,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,1746283130309077439,17014863821430222934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,1746283130309077439,17014863821430222934,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1746283130309077439,17014863821430222934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1746283130309077439,17014863821430222934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1746283130309077439,17014863821430222934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1746283130309077439,17014863821430222934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1746283130309077439,17014863821430222934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1746283130309077439,17014863821430222934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,1746283130309077439,17014863821430222934,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,1746283130309077439,17014863821430222934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 /prefetch:82⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,1746283130309077439,17014863821430222934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1746283130309077439,17014863821430222934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1968 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1746283130309077439,17014863821430222934,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6492 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1746283130309077439,17014863821430222934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1746283130309077439,17014863821430222934,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:4580
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
20KB
MD52ebfdbd309ee762211b4a2ac39708c4d
SHA1b002922c672dbe1dd4caa02af24d0b1e7da616af
SHA25654ae97d445b166859fe3ba6241b97abbac0aa0d158c72352b774d60ba3e81797
SHA512d1687b7a6da07a72963c96a1e85661046d3d3c96f88445302afa09721fbe211a5fb8881ff14b346b0ebe8a20f5ced21979e9f58e256427e57b85d565bef17720
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD595a01a335ee2b23e2689704beadb84f1
SHA15b5e139c5c56b9b211e26f1ff93ae99bcf7f6fa9
SHA2566c40eefab4fadfb9c8b495119220bffa98b8ddb1b2468aaf10eb32818749bc94
SHA512eab49be25deb5e4a425663a851966c4f7502b7b90da3a30b089e577039b3a25414cc7758793f710cf54ad5e0645301cfabf86aa33ba651b44619500db656a00a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5ddc6cdfed41b79360df3cfbbb4d9bab2
SHA1ddc7227e3906dd8e1a87bdb7394627371fba3a3f
SHA25696f4ec6b3e18105a9ee7ffbe741ebcea8b79b60dd169ec449373110d9e214942
SHA512d884de72e55905ecfc6d3005fe03e135a294a4252b91ef174bc90406d2b064378a5f4964f610510e7b82f589244f1de50b526dcdf5be33755e769feaee2c54e8
-
Filesize
1KB
MD550f1ff77a8834775d0333a6fe7dc0e03
SHA1308c8da1b773d16e3740e3585a96023b4516cb36
SHA256a3997d36119a5ae227abdec220e12e2b40f7bcda4ddbae928be0bfeafd24857f
SHA51287db0bb009420998283629ac0c24d9deb946c5da45dcbb100ab766d1f418521a9f6ccdc2144039c125bdd84efc01a9d375ad4c8e310316450e1a3264034c097b
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD52acb5da6273091fa33934f5ce512bbfb
SHA191c2c73cc87c398e54ca7b901813b7760efad386
SHA2568a59d621e1a9758523fc8164addd832cce3d05041f87d2b6eeb4b95db3dd3658
SHA512f088eb8f811f354c97670a9699e746e25bd07efcbcafc8277614219389050878f3ba81f35d56f8fa0cdb3e92d44c3eac577cd851c0017bd6cb519f0585906b5a
-
Filesize
5KB
MD54aee1a6e2d3270e572fa91b11d8e75a1
SHA1ac28d99c78fc7266b72cd0645e0fe6db2b230c12
SHA256e1c8243fc3c26f0a83fdc943f09f91bb2c63e6ed833936fab19352fc723889bc
SHA51251313eab64e96e7e5ab70c1d654a4c0003e506a46eb7bf154405dece29870568e53dba163df9585d41e31eca5566e72a9dd13bc1b9cb85c3af7afc732325a44c
-
Filesize
7KB
MD5a037395de47532e0e1b3187375f9b0e5
SHA11fb84b013777db9fc0ba0821cc982a2f5b5977f7
SHA256ab78efe0e20b029d91c4a4b2c27f6ed2728c6da0fe212535cb315634349955bb
SHA5125313fe96f06206c9b0dd12caca765e39a52acc4e7b65c01c8a66129bc2ee494ad30f00c305352f0fb949d52684197c4fb3c80402780e5fff5560e86516f969c1
-
Filesize
370B
MD5c7324c7a5bb15f29efd2bd7644e29611
SHA145bbf49da81057e937e9891485b51c856f37d4aa
SHA2566d63ea6985ad9b2b8e7b51d2db92ef7d4068e590f26ed47a7721a1a33ea0b5e6
SHA512d11082a2196eda6ba2d86c334152f2faea5b3b268a770556c35f32e49b1a5684808e765dd191f99eeffc6c821257e7a495c90bcfdedb2c6b4d4f5a4a34834897
-
Filesize
203B
MD5491b7fbb11a76073d21b388eb3d33e0b
SHA1a48d730fba962c84a830d2a7ec3fa7ab946bcefd
SHA2564b8d840664d342333977f64bdd2d523adf2e73fe76eb131587d4a004d54d9c30
SHA5128dccf81d7d952bb5243aba05aa66fd84f7ea8c7bd7630ae10855c38d34a4a13d7f7f8611b6dce14a586425c62b47064b5e01eb74a7f5d9096791e29d781a4640
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD551636766b3e3e81e7b2eed217fc25259
SHA1d1d36733c878d56cc4e276e05e09a52df84db1b6
SHA256215647a554caa0d2f85ab2bc39f211846b87d05493b6670ab7e31dee7bf86818
SHA5120e6dd1b91e5a91718374a50b323c6539320fa63fe38b38ccd30fc18b43971c9c40e692645b24d8ac4f14dd7992c35892b919dfe1ce31dfafe0f8be6fd95b6e0f