Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 06:38
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4adb51a960d26e36798dcb2c69d68873.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4adb51a960d26e36798dcb2c69d68873.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4adb51a960d26e36798dcb2c69d68873.html
-
Size
90KB
-
MD5
4adb51a960d26e36798dcb2c69d68873
-
SHA1
f97988e4ddf3d06d8f39815f7c39d99a387d902d
-
SHA256
0eb557b8aa9d185a36951c945a66e4960111e6dbe8631ac1b3d3eb982b55f844
-
SHA512
babcf6e3ca5dfe3b660d43a541a9b2d80fe71a92094c4e0241e46f8ee33243d02beabaf13683f8d01847be91f6000e482b0f8031a1b90caa746dca366907d7d6
-
SSDEEP
1536:HLNCGEx04GwE63rqVDbCuJ99tDIGX69OlL4tqj3kwKTlqAbJqJk:HLNWK23rqVbCe9tZXCOlL4I3kwIbJqJk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 452 msedge.exe 452 msedge.exe 1088 msedge.exe 1088 msedge.exe 4648 identity_helper.exe 4648 identity_helper.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1088 wrote to memory of 3816 1088 msedge.exe 82 PID 1088 wrote to memory of 3816 1088 msedge.exe 82 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 4556 1088 msedge.exe 83 PID 1088 wrote to memory of 452 1088 msedge.exe 84 PID 1088 wrote to memory of 452 1088 msedge.exe 84 PID 1088 wrote to memory of 4740 1088 msedge.exe 85 PID 1088 wrote to memory of 4740 1088 msedge.exe 85 PID 1088 wrote to memory of 4740 1088 msedge.exe 85 PID 1088 wrote to memory of 4740 1088 msedge.exe 85 PID 1088 wrote to memory of 4740 1088 msedge.exe 85 PID 1088 wrote to memory of 4740 1088 msedge.exe 85 PID 1088 wrote to memory of 4740 1088 msedge.exe 85 PID 1088 wrote to memory of 4740 1088 msedge.exe 85 PID 1088 wrote to memory of 4740 1088 msedge.exe 85 PID 1088 wrote to memory of 4740 1088 msedge.exe 85 PID 1088 wrote to memory of 4740 1088 msedge.exe 85 PID 1088 wrote to memory of 4740 1088 msedge.exe 85 PID 1088 wrote to memory of 4740 1088 msedge.exe 85 PID 1088 wrote to memory of 4740 1088 msedge.exe 85 PID 1088 wrote to memory of 4740 1088 msedge.exe 85 PID 1088 wrote to memory of 4740 1088 msedge.exe 85 PID 1088 wrote to memory of 4740 1088 msedge.exe 85 PID 1088 wrote to memory of 4740 1088 msedge.exe 85 PID 1088 wrote to memory of 4740 1088 msedge.exe 85 PID 1088 wrote to memory of 4740 1088 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4adb51a960d26e36798dcb2c69d68873.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1cde46f8,0x7ffc1cde4708,0x7ffc1cde47182⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,3842968047371288967,9627172523266879508,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,3842968047371288967,9627172523266879508,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,3842968047371288967,9627172523266879508,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,3842968047371288967,9627172523266879508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,3842968047371288967,9627172523266879508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,3842968047371288967,9627172523266879508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,3842968047371288967,9627172523266879508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,3842968047371288967,9627172523266879508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,3842968047371288967,9627172523266879508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,3842968047371288967,9627172523266879508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,3842968047371288967,9627172523266879508,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,3842968047371288967,9627172523266879508,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,3842968047371288967,9627172523266879508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,3842968047371288967,9627172523266879508,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,3842968047371288967,9627172523266879508,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,3842968047371288967,9627172523266879508,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,3842968047371288967,9627172523266879508,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD529d0ac2d136a1f3ee425f91ada4e2d1e
SHA18583a90324e98af3e3723288c538052c78307fb6
SHA25606a8c8ba0aae5454fe725e9f6e83a26561933ff5274cf250086cc469be2d315e
SHA5121b90e6169b90ab813ed24d5133b5c846c9294cf5e4584d050032f4b0591bc797d82e1d9198fc7ec82d33bffc020665d17ca7e9bdc63f6fd0359a64fa9f46bcda
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD558f820776107cb90b4d3b3e368b7b500
SHA13c208e96b5889e8fcfaf7bf37e4e81215032f942
SHA2568607d28a8f4a11e540ec4fc9dcbea4d69175e1564b8ed63837366dd2cd552024
SHA512ba6e32f34b812e5b1093065d61cbda45e89c50d3329eb16088f323c116e814c8708ba89b85d54e3eb426fa5839061ee667d6156f524b5ebccd869ea0c6d41a04
-
Filesize
1KB
MD55e63dd336fd897a9b407f51746b237bb
SHA1e1f3f22392abbadda2fa28193321f32911d57dcc
SHA2564d38b9c161f168c7d11d51d71ec1e7ff0d8663d4f5e7442ab5b078474abf8e38
SHA51222ae7ac7d7f32d3a2abe2f3a8301a2281de08fda6ad5cac3221340954f49a9eb4b319ed4627e9886b11530cefd596ec12a25d19f2bad87ac83348d4983c66df5
-
Filesize
7KB
MD505bfd849ddecff7132c1d8ab78799fc9
SHA15d447ccb578fc370bd66a201aae52ff85aa3cd23
SHA256f253687554000b1fcb4f25efe8a54c4fbf556af963e6e791dfa0ae4cb4b3d707
SHA51292a859199ace8f1b7fe9e7a4a51fe69c7c5332a75483086f4582c3875b540e1735321152b8c5b493c9f4268442620509cbed742a60509272702695882d339d79
-
Filesize
5KB
MD574ae3ffd950b5cbf712b5b58bebb23ff
SHA138bcae1e1d90a2591c3fbec82025b577d1bc73e0
SHA2567114f6c3f5c106c29392f4ce73f8ac50f2cf86fb9257cbe7daeab7065717ed6f
SHA5128a6527fc67b89a0c80ad104ac0f589f5649e0a6589162ab075a9263ed778b78880f3d6b02180860cf6bee918725ed4ec33a6a6a82d6d8d37bfa5228fda13d95b
-
Filesize
7KB
MD5dff9a9ba77f9e09d24d5755b036e728f
SHA147a1a553b6ae834e76d51c320d2d7e195c7ab9cb
SHA256839d7e0289870dee4bace6c527af7591f220d26e95b156ce4fe5b463a4914c82
SHA512a0f2a03d2d2157f8aae9add747af437efbc433d8a09d6f3a8050653690282b252a7320d18a69d44b2f60a3f46683f32580df8fe24afc5228806908c542bbbb0f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54c49a956cb4301bde8b4f8105ed4f634
SHA1b4a2864d4a3357603d65f2bce07de4d3bb3fc9a8
SHA256c4d802884208fb8627b97eaf6b99b7839d79bb9904b577be64f58deac5ca93f1
SHA5128858ef18eef3c4e58a262cc8e3518afb0bf77fa30d725b02dd30b7b295a62f82229ffbff95eba64b791aa8f61664736a8a3319435e4f63d6d56e5135414d336a