Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 08:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_59669a6b1562b6d9a60cd8bb72a2e24a.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_59669a6b1562b6d9a60cd8bb72a2e24a.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_59669a6b1562b6d9a60cd8bb72a2e24a.html
-
Size
83KB
-
MD5
59669a6b1562b6d9a60cd8bb72a2e24a
-
SHA1
a844437b34c96c419af3510d582a918361b03957
-
SHA256
fe49fbdf94c66073282674e0f2da13a455e3268183036bfd8bf943e0047db4c6
-
SHA512
46c9954b99d6916e1e3189033d0729606a96b4c9c65568525f1dfe08fcb73e75a8a09dba63d445a9ee4a368c92236c06b13d597000bdcc0af97da72944a9c1ff
-
SSDEEP
1536:/BnbXKK4KpB3fhS1sgPkGcHrHAGcHtGc/TTdkeWCN6d67BdHdPKeBdXEh4AvzsTh:5nZ4KpB3fIrNN/bIUKeBV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 3780 msedge.exe 3780 msedge.exe 3960 identity_helper.exe 3960 identity_helper.exe 5140 msedge.exe 5140 msedge.exe 5140 msedge.exe 5140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3780 wrote to memory of 4684 3780 msedge.exe 85 PID 3780 wrote to memory of 4684 3780 msedge.exe 85 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 2640 3780 msedge.exe 86 PID 3780 wrote to memory of 3600 3780 msedge.exe 87 PID 3780 wrote to memory of 3600 3780 msedge.exe 87 PID 3780 wrote to memory of 4720 3780 msedge.exe 88 PID 3780 wrote to memory of 4720 3780 msedge.exe 88 PID 3780 wrote to memory of 4720 3780 msedge.exe 88 PID 3780 wrote to memory of 4720 3780 msedge.exe 88 PID 3780 wrote to memory of 4720 3780 msedge.exe 88 PID 3780 wrote to memory of 4720 3780 msedge.exe 88 PID 3780 wrote to memory of 4720 3780 msedge.exe 88 PID 3780 wrote to memory of 4720 3780 msedge.exe 88 PID 3780 wrote to memory of 4720 3780 msedge.exe 88 PID 3780 wrote to memory of 4720 3780 msedge.exe 88 PID 3780 wrote to memory of 4720 3780 msedge.exe 88 PID 3780 wrote to memory of 4720 3780 msedge.exe 88 PID 3780 wrote to memory of 4720 3780 msedge.exe 88 PID 3780 wrote to memory of 4720 3780 msedge.exe 88 PID 3780 wrote to memory of 4720 3780 msedge.exe 88 PID 3780 wrote to memory of 4720 3780 msedge.exe 88 PID 3780 wrote to memory of 4720 3780 msedge.exe 88 PID 3780 wrote to memory of 4720 3780 msedge.exe 88 PID 3780 wrote to memory of 4720 3780 msedge.exe 88 PID 3780 wrote to memory of 4720 3780 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_59669a6b1562b6d9a60cd8bb72a2e24a.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa989a46f8,0x7ffa989a4708,0x7ffa989a47182⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,17851055306505314972,6389575003317845433,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,17851055306505314972,6389575003317845433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,17851055306505314972,6389575003317845433,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17851055306505314972,6389575003317845433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17851055306505314972,6389575003317845433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17851055306505314972,6389575003317845433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17851055306505314972,6389575003317845433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:12⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17851055306505314972,6389575003317845433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17851055306505314972,6389575003317845433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17851055306505314972,6389575003317845433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,17851055306505314972,6389575003317845433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6744 /prefetch:82⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,17851055306505314972,6389575003317845433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17851055306505314972,6389575003317845433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6212 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17851055306505314972,6389575003317845433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6436 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17851055306505314972,6389575003317845433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,17851055306505314972,6389575003317845433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,17851055306505314972,6389575003317845433,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD5c822c606aad4465677e3ef8ae4c6e733
SHA1cf9627d2f6feaf494ea70b012eda02740d3101db
SHA25609b28611354c7a8f0c885a903a79be9598b4452107002bb95861aa4461f5cc18
SHA512792b7cd3fa81d0d8d54108ce300b8422339198e885e091f5fb0bd67640ef1af95d87df24197648dc6f4a76854dabd40c127e8d29bebcc3b923242270ef8e344f
-
Filesize
3KB
MD5b5666bfec6eb1793297b21e0bb73d352
SHA1d52195598b00e239f817b91f0a8226fc1cbf2913
SHA25622543b6856ee635ab4c181daee2db1582860697172415d8bb90cd9753b956062
SHA512a87951d6f9c08ad60fa8f11754e1a6cb932588059a1be12fa4201389a1b6a156720553af8fb0f97e150c3288673fb869a7abe4c60ca704ae3591a658ee740f1e
-
Filesize
3KB
MD5d61905c3209f1e08a5719adc74c1ed87
SHA1c0319a642cb8edf2304b2361f2d19c48e236a8bd
SHA2560874f8672e87d984fdf701f464979054ef2c60272246cfa9c78b978a6610619f
SHA51241647aff217c6a04c54c25a96f65a46224396d79573a664bc125b897530c9e7817c46debaea6399663090d0543f0e711e9a5c07c8e17c8923cbc40a0713d8496
-
Filesize
7KB
MD5d403e74b2eb9237d1a96035611d9c90b
SHA1426379c0561ff290feb9b9f704546140d4207caf
SHA256172f4681169f8f4b4a8fa61543ae4d9a85a47fafc8a4ba76e65e1ee81b2c6569
SHA5120e932923610611729cfee59c5d36b1d0f8a265736bc9ba55279be9b40de4a030b9e7883e1e8291cc93d97924d99aeb53da97de54ad2e92130875819dc26e2cfd
-
Filesize
5KB
MD5ab0e2203e2b5ab02d96371fcc84f040f
SHA108e22a701bbb22109a5c992cb353da6a793a7d39
SHA256af3ec36a9aa445d81161d51bd4cc9cf9425b7985c275a7a874acda3c48b8a2c7
SHA51240d47e3a734b302bfcaf381b12b7c351ed5f3aa53c048c52f714e05f14edd06f75f9d319673d5ac064d1847fd355fd36740e7c2e9e7a586689bcd995c92efc70
-
Filesize
7KB
MD57b40d6694e90533d840b428c9f258ce1
SHA1b2e21ee9eb63c01fe04d360f860ed6c46c1fae5b
SHA256c1f0f221b41b0f8b3e5dd7de027d2c0200500df6e55365e7beab6934ae2d36f1
SHA51210a8ac7808cd8a7d8a255cb14cfaa16bb9b8a423cff8971372cf014f8aac4dae167cf81a6ae28572ae5d05b0815c0b1fe348c6a798d67e78d36f9326166822fc
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5d82ac3f5b78eca7d919f1676a2e689b1
SHA1b3eb198a6d9905148a9f2759d66f09dc9d0f0776
SHA256f79623fad407798c324de8a453df2340861288f91f255171bf8557f988599458
SHA512f9e155430e47483afb5166ce8a6e44f90e692dac8d4ccd522614bb35049f1d85a277cb997eec964a0d92d94303a19a9b5afac10560770e4253664f95d8f7338e