Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 12:23
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_235ca5202923526a7d0e4fd950904c12.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_235ca5202923526a7d0e4fd950904c12.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_235ca5202923526a7d0e4fd950904c12.html
-
Size
85KB
-
MD5
235ca5202923526a7d0e4fd950904c12
-
SHA1
ffabae71f8b20f7643e9a043146ba207b3697fec
-
SHA256
6968671f828faf99e03b1a068e2ac9effe71076caa7a9dafb59212edf4325941
-
SHA512
bef22eb8eaa7fdcd93e6971e5b2cffd5e7f21038892b93e55bb188893f14c75baa05b9176bad7f9d1cd818bd4ffc2d1ffeb3ac3b5f434f481f0ed00be0480977
-
SSDEEP
1536:zKWV/PbZ0N7gHrp4ljMnyI6JgRDvLB8wE+DLml7:nF0eHrp41MH6Hh+DLml7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2740 msedge.exe 2740 msedge.exe 4384 msedge.exe 4384 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 3408 identity_helper.exe 3408 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4384 wrote to memory of 5032 4384 msedge.exe 83 PID 4384 wrote to memory of 5032 4384 msedge.exe 83 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 3092 4384 msedge.exe 84 PID 4384 wrote to memory of 2740 4384 msedge.exe 85 PID 4384 wrote to memory of 2740 4384 msedge.exe 85 PID 4384 wrote to memory of 2160 4384 msedge.exe 86 PID 4384 wrote to memory of 2160 4384 msedge.exe 86 PID 4384 wrote to memory of 2160 4384 msedge.exe 86 PID 4384 wrote to memory of 2160 4384 msedge.exe 86 PID 4384 wrote to memory of 2160 4384 msedge.exe 86 PID 4384 wrote to memory of 2160 4384 msedge.exe 86 PID 4384 wrote to memory of 2160 4384 msedge.exe 86 PID 4384 wrote to memory of 2160 4384 msedge.exe 86 PID 4384 wrote to memory of 2160 4384 msedge.exe 86 PID 4384 wrote to memory of 2160 4384 msedge.exe 86 PID 4384 wrote to memory of 2160 4384 msedge.exe 86 PID 4384 wrote to memory of 2160 4384 msedge.exe 86 PID 4384 wrote to memory of 2160 4384 msedge.exe 86 PID 4384 wrote to memory of 2160 4384 msedge.exe 86 PID 4384 wrote to memory of 2160 4384 msedge.exe 86 PID 4384 wrote to memory of 2160 4384 msedge.exe 86 PID 4384 wrote to memory of 2160 4384 msedge.exe 86 PID 4384 wrote to memory of 2160 4384 msedge.exe 86 PID 4384 wrote to memory of 2160 4384 msedge.exe 86 PID 4384 wrote to memory of 2160 4384 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_235ca5202923526a7d0e4fd950904c12.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe649f46f8,0x7ffe649f4708,0x7ffe649f47182⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4672 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1256 /prefetch:82⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1164 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6788 /prefetch:12⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,243925853712712498,10589027904251215877,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6736 /prefetch:12⤵PID:3676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5401ee37d58009a752549f9fc24714fab
SHA1cd12cd14545b657ba8f8c56fb5340cb1b60efcf7
SHA256b63a4998c37cd3a12aae6ebc78b7d42c364396fc9a06173ad68dd227e9becd16
SHA5122416709b5bd294de3d656e952adc866990af7dbccf82bcb366dbd192e497ea472ea17b266eea83ba49a93cc78b250e5e1924753200646405c99db278cda15931
-
Filesize
1KB
MD5603211616a9cdef5024109a6fb522172
SHA16f11ed822a8560758df3f25a4df8584a9c028aca
SHA256df3cc713689550793036e2dea94354011686f21596354a78761ef3f4190e724d
SHA512e6cb2192cd4993e4f7a7262710cb8b01f1469d80a46693c6f6bce5aa439f242650e90fc4f38a003db64e72b98bc19833b719581257aef1b5f38f92d8696f9127
-
Filesize
7KB
MD569aa9e8cf08765be546457edd33208e2
SHA16c1343e1b116a8eabcd6a62eb16736b86068fcba
SHA25604c8431f7560dd277a8d11adaff3b17115067f23b6ccca58180c6d5f65a57ce9
SHA512bbd16b2aa680ac7b3c3aa67fc3d59e916dce96dfaa19a9c3bc476682baa238b793db7c27a0f79f68b753f225471ef5cc0f7ac65dd66f418e35bfca1f1b6822bf
-
Filesize
5KB
MD514c654368de191937cbaf353f8164077
SHA1803261e39bedaa3877cc79f2ca16afa9cf867d11
SHA2564d0913ca8cafad9e7f521e8d41f3a8a1d4c37d9f4aa06c48ee0ba1caafbcc8fe
SHA5121d2bb4be5094caa22b2cafbcead6941c903c9f375fafc97386ef5b0c3c52595e9679e73e9bd2d6758d37cc1685c3e454c6d4cc455d99514b06c27250384492df
-
Filesize
7KB
MD5ab965dffdc294d6cc3a35d1e50e5330e
SHA1a5460b10933eb2c2cae676939ca5c16b7070f985
SHA25667f2b140dae2644676ed1c564912580b94badce369bf107854d22c2a9e49d642
SHA512d91cfde2a3f4f3151c099c261c4550c492f199159e83dc55d7cfc96fe3bf40d358e27c9c3cb9f439568214b4ce8b6a3c171ab88e59bc84545adc8e4c6553201f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5b6ddb5e520d19e1ae133962a8dd1249c
SHA1c235b2dc1eca35371bfff8de672ffc8b4487cda8
SHA2567b88fd1564c2072e087f2f3555493bc6a7598faee536487e919a474dc2cafa2c
SHA5128a10209a049566667a949479633192fab6143f6cbee9871549285b84ba97249475e66640d4fdb1a6f0ee674bcca434a5bf246111108eee0f388abb537afc8da5