Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 07:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4d25e8c251c9d7e2903937992f003f5f.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4d25e8c251c9d7e2903937992f003f5f.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4d25e8c251c9d7e2903937992f003f5f.html
-
Size
84KB
-
MD5
4d25e8c251c9d7e2903937992f003f5f
-
SHA1
b6a73d3d6398dca6bafec9b0cc6a964b008032f7
-
SHA256
0a79b8a17034b6e3b5a64ca8672ad9f557d5882b8a88b8035fd6a6bdf1b3b80b
-
SHA512
7aae420b5ab8f2c663546fe0e939d8c3832ead08684c45130792eeaeafb6e6edbe26540ba6c03b7850747586f30ccac7a2a0bfa168b7818019076a33ff3327b3
-
SSDEEP
1536:+KWV/PfG01vS9enyI6JgRDvLB8wE+ZLsh:qu009eH6Hh+ZLsh
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1740 msedge.exe 1740 msedge.exe 2432 msedge.exe 2432 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1400 msedge.exe 1424 identity_helper.exe 1424 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2896 2432 msedge.exe 83 PID 2432 wrote to memory of 2896 2432 msedge.exe 83 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 3956 2432 msedge.exe 84 PID 2432 wrote to memory of 1740 2432 msedge.exe 85 PID 2432 wrote to memory of 1740 2432 msedge.exe 85 PID 2432 wrote to memory of 1992 2432 msedge.exe 86 PID 2432 wrote to memory of 1992 2432 msedge.exe 86 PID 2432 wrote to memory of 1992 2432 msedge.exe 86 PID 2432 wrote to memory of 1992 2432 msedge.exe 86 PID 2432 wrote to memory of 1992 2432 msedge.exe 86 PID 2432 wrote to memory of 1992 2432 msedge.exe 86 PID 2432 wrote to memory of 1992 2432 msedge.exe 86 PID 2432 wrote to memory of 1992 2432 msedge.exe 86 PID 2432 wrote to memory of 1992 2432 msedge.exe 86 PID 2432 wrote to memory of 1992 2432 msedge.exe 86 PID 2432 wrote to memory of 1992 2432 msedge.exe 86 PID 2432 wrote to memory of 1992 2432 msedge.exe 86 PID 2432 wrote to memory of 1992 2432 msedge.exe 86 PID 2432 wrote to memory of 1992 2432 msedge.exe 86 PID 2432 wrote to memory of 1992 2432 msedge.exe 86 PID 2432 wrote to memory of 1992 2432 msedge.exe 86 PID 2432 wrote to memory of 1992 2432 msedge.exe 86 PID 2432 wrote to memory of 1992 2432 msedge.exe 86 PID 2432 wrote to memory of 1992 2432 msedge.exe 86 PID 2432 wrote to memory of 1992 2432 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d25e8c251c9d7e2903937992f003f5f.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffefdc546f8,0x7ffefdc54708,0x7ffefdc547182⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3360 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2620 /prefetch:82⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6752 /prefetch:12⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6516 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18001026702433177948,5169136737067439490,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6424 /prefetch:12⤵PID:3980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5e2b4fde38ab78e9312a520f65968e839
SHA1011d9c1853a68a3036b1801ba649c6561ae921d5
SHA256676fdc44adbf6cfebb6b012ab4e7249721c1d23e5b4c403c181d480a61e21681
SHA512d18539a2fc49475052c58d28d45237eb1f23a7677a18d152585be9492ffd573be329ecd207c708d9b3ab8b4cccf6ff3093aa3c7b759ed37952f0b6f3e17e3908
-
Filesize
2KB
MD57374c623910bee10d21f8c48611c2324
SHA1fa6dc165e8cfb7abea66e530c32b5092b51c4119
SHA25685caf0bb73ffbb89e8585d800fe13c6d5e2b00ae1c8fff4740f85e93cbe7d389
SHA51263ac79729ae691dc403ecb9e00249470b81d1016f06cff3ce6edcda6ee1ed0cafa7029963c2a0a498cb588425c45c79750af992a506683e8f78f00813e288781
-
Filesize
5KB
MD59afb0746af4b85e89d6acba1ee4d3df1
SHA16b118b66a4c15cfdbabd26df5fda98e109ad55c0
SHA2568211397fd8ca35a0dc097bbf52fb9b7a37a2ca8c17215e450b6760323cd0c389
SHA5120ffe18f8f211909330bbcc73b0f7b3b37d799351078ba7af2a6eb8c4dfe052bd07caa1bb8deb149350174ac06b4d27facd320de809d17592ceb0d1507c510916
-
Filesize
8KB
MD5ab9f5f3817b3616255c929c999c9d2e9
SHA11434dcb0ca8c01fd5cbd0a66d1bfe14ad1aeae2a
SHA25650450ab33b44725c4db36b0ec9ab243bd0a08ae52a5a8aa6d6bb9f9890cf9c86
SHA512bb8feb8952ebd542947279a2549dfd54f1be0723c04879ca1d88337b7e78a9ff8649eae758ab3cf4d2d1b731d5653921f353865bb537e463810ae0225d418e19
-
Filesize
7KB
MD518553c297230af829b3eb10cde518944
SHA1958e2e40bff41fe7ac34373846603f1e840c9946
SHA256df750171bbc6205689e8aa79bcb980912d6b952162f32c9a07fa7618089c066f
SHA5127cdf0bf124d885150c1415635e8d38606c0d4d4473d7c083a42564ed22000d9becbd48e76948d6349d32adf420775dc76c49884399674120c3c44a9be65aa152
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a42de4f74dc1286d6195bf4ec5e5a189
SHA1c3fe1e793ccc682ff4ea461d71228b4cd9aa0b79
SHA25671daeb4eacb29d05bddad824fc1ab21ed0ee3eb3580bcc25e593dd4dedd87abd
SHA5126549da4b6fa530f1dbed81a7eb9b43bec38fa790fd7819ad45ca35d9f9055526d896cfec5bf73f28e9d5bb1d39856f2130575ab63127d8c6a3c2bdab1a6a114e