Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 20:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_398ce675b568a776e514efd8c7c3d4fb.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_398ce675b568a776e514efd8c7c3d4fb.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_398ce675b568a776e514efd8c7c3d4fb.html
-
Size
77KB
-
MD5
398ce675b568a776e514efd8c7c3d4fb
-
SHA1
21a7773df50330b52ea927084c50ea97edbad0cf
-
SHA256
1e19d601638f1975e0c59b44f7899d9643e36b778aa1095da708c57bbd204557
-
SHA512
34536b422310bae08b5f11dbb17410351e3318f7f52ada1b2e8c2286f07a28d75eb85389ce6c5a61fbf1c809c873258b5abb748b8d2de5f746554edee2f4d98c
-
SSDEEP
1536:OLNCGEx04GcE63rqCtdZKcnwheX69yEcZr3kwKTlqAbHSJt:OLNWKq3rqG1GeXC1cZr3kwIbHSJt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2120 msedge.exe 2120 msedge.exe 4512 msedge.exe 4512 msedge.exe 4572 identity_helper.exe 4572 identity_helper.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4512 wrote to memory of 4832 4512 msedge.exe 82 PID 4512 wrote to memory of 4832 4512 msedge.exe 82 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 3164 4512 msedge.exe 83 PID 4512 wrote to memory of 2120 4512 msedge.exe 84 PID 4512 wrote to memory of 2120 4512 msedge.exe 84 PID 4512 wrote to memory of 2488 4512 msedge.exe 85 PID 4512 wrote to memory of 2488 4512 msedge.exe 85 PID 4512 wrote to memory of 2488 4512 msedge.exe 85 PID 4512 wrote to memory of 2488 4512 msedge.exe 85 PID 4512 wrote to memory of 2488 4512 msedge.exe 85 PID 4512 wrote to memory of 2488 4512 msedge.exe 85 PID 4512 wrote to memory of 2488 4512 msedge.exe 85 PID 4512 wrote to memory of 2488 4512 msedge.exe 85 PID 4512 wrote to memory of 2488 4512 msedge.exe 85 PID 4512 wrote to memory of 2488 4512 msedge.exe 85 PID 4512 wrote to memory of 2488 4512 msedge.exe 85 PID 4512 wrote to memory of 2488 4512 msedge.exe 85 PID 4512 wrote to memory of 2488 4512 msedge.exe 85 PID 4512 wrote to memory of 2488 4512 msedge.exe 85 PID 4512 wrote to memory of 2488 4512 msedge.exe 85 PID 4512 wrote to memory of 2488 4512 msedge.exe 85 PID 4512 wrote to memory of 2488 4512 msedge.exe 85 PID 4512 wrote to memory of 2488 4512 msedge.exe 85 PID 4512 wrote to memory of 2488 4512 msedge.exe 85 PID 4512 wrote to memory of 2488 4512 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_398ce675b568a776e514efd8c7c3d4fb.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc46f246f8,0x7ffc46f24708,0x7ffc46f247182⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,15267142796560321771,3277244535802553878,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,15267142796560321771,3277244535802553878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,15267142796560321771,3277244535802553878,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15267142796560321771,3277244535802553878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15267142796560321771,3277244535802553878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15267142796560321771,3277244535802553878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15267142796560321771,3277244535802553878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15267142796560321771,3277244535802553878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15267142796560321771,3277244535802553878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15267142796560321771,3277244535802553878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,15267142796560321771,3277244535802553878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3700 /prefetch:82⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,15267142796560321771,3277244535802553878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3700 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15267142796560321771,3277244535802553878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6264 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15267142796560321771,3277244535802553878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6208 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15267142796560321771,3277244535802553878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15267142796560321771,3277244535802553878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,15267142796560321771,3277244535802553878,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD592658807b8df97a0f1940956d996c24a
SHA184530311d733fa492598c89b202d3a2d2a657682
SHA256070e1c227df350c77daf13ebff946d0a4d748527ca34353b411cba22002e6bf1
SHA51216cfa0343a78a77f4e8b442b0a28b64b6f1e311cb87ea586b74a6c741143182073381741663eaa5ddcb548b39a11f4313f61215e078ee147bfab082f15827ea0
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD549ce1a3daef4c9461a8e78c8c862c023
SHA133d21b729a7320c9e2e36ac69a99517659fe4675
SHA2562276cc089dcb61c21087e5082315abd6dc3d38972a207e8125a19cd91128a483
SHA512683ead1b41d20835ddfe5f5fd05ed1784f5e057d79dea2a159a7242e5bc752f16bf8af72448dec268eb6b7be07f5e6f62da6e6084f7c90e860bec633e0258735
-
Filesize
1KB
MD547c657458e6f3c335316b80c4aa8711b
SHA14c5bf05cb572a73749d9d3be5a0969ac7b70b904
SHA2560818513f2ee8121efd397920f6eeab47f100d4c7c58d8039fd3342cfd03ed71b
SHA51298f59631acace6b1c8d09eeca4472a3fdcf5690dbf4b35ec1dc41e0fc6bee44354e9df846a5171377f8c5da61f9f1a70bddf0b243593fb1f27aa82b709d95b4b
-
Filesize
5KB
MD5f9c527d4763978c30f72737ce8bb0c52
SHA1f7cc514243a64ec58906e754e91081ad8a25235f
SHA256541cb01a33242a1a5f5b5f700180def42d4944515abf5e5b41f7fff225a0ca4a
SHA5123df484abe37ae68298ceefb423cb9f1d6b7520541210eb6109563ba1223da9fac4319631e26bc458beb95f69f550613bb08bb1dfe1e8d7fc466b47fba61334a3
-
Filesize
7KB
MD501b5122c0ca0a2b793f2f61da693e7e5
SHA118bd60cdc44f897d91b1e283cd560f3d7e229fa8
SHA256a5ddf05759a238aed60f5f2076ad38382ba197330d7dcb4149ec36427c6c7704
SHA512a7471f91b8324538fee904317a8c484be86bccc74813cc60369e9b57cae950f12ce83d4ca761be39ddb85899fcff123aec82043b4cb950fc3e9b345a8f95bc72
-
Filesize
7KB
MD55cb00bc8d62ffe85d768b4923eadd0d1
SHA13b3bd581a99b16d657da83e50fcbcece92d73278
SHA25688fe3d39d3e6a051cb927f6bd0300b5261323b63ae2a203569be077842dce303
SHA51271e73bde49756fd52faf786cce2a9a1c3aaefba99e229ff8d4f542a4aba6a273202f3979cabe50a6857cb6929097f206bf5ba2dec67592218981f2cadba85b37
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5704d817af621177a01d83c7083c93951
SHA1c6e82495d38d9da91646966171bb4b067110ca3d
SHA256dfbbe6d4b9aaf64c15312ecbc3d3f23e8f1c456d4fa7f661013a9f6d5bf5c408
SHA5126f6825581ce236993d6745c8db96e49628371f134622d2ecd2b25d507562ee5e6ff6c4def28c0be413dd00f1c6e9ad44b88550bcc718cf8cff9bf04f0983cbf5