Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 10:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5cb628463d191343d7bda07eb9b99038.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5cb628463d191343d7bda07eb9b99038.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5cb628463d191343d7bda07eb9b99038.html
-
Size
58KB
-
MD5
5cb628463d191343d7bda07eb9b99038
-
SHA1
e3aee68a93c1eb9e1552f150204fdd6a033fbd6a
-
SHA256
518b045da08bcda1ed64376760962602ed2415466985f99748fd1dc1c7a0f83c
-
SHA512
a587bb5622c67052cc758e6a2ea4616bc601f208e5a5a75e2fd2fa0439865d9098c8f84d3272a4a72bdfe7fe3a9cc8c707da6813e056b4d74a7cc4241e15997a
-
SSDEEP
1536:1nuXK+4KpB3flSTLl6uJCdqJoTqJfTUJwdqJiTqJoTqJ/TqJ/TqJVTqJ/TqJ/Tqp:1nI4KpB3fcjBn/nrkWB9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5104 msedge.exe 5104 msedge.exe 4740 msedge.exe 4740 msedge.exe 1856 identity_helper.exe 1856 identity_helper.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4740 wrote to memory of 4812 4740 msedge.exe 85 PID 4740 wrote to memory of 4812 4740 msedge.exe 85 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 3964 4740 msedge.exe 86 PID 4740 wrote to memory of 5104 4740 msedge.exe 87 PID 4740 wrote to memory of 5104 4740 msedge.exe 87 PID 4740 wrote to memory of 2764 4740 msedge.exe 88 PID 4740 wrote to memory of 2764 4740 msedge.exe 88 PID 4740 wrote to memory of 2764 4740 msedge.exe 88 PID 4740 wrote to memory of 2764 4740 msedge.exe 88 PID 4740 wrote to memory of 2764 4740 msedge.exe 88 PID 4740 wrote to memory of 2764 4740 msedge.exe 88 PID 4740 wrote to memory of 2764 4740 msedge.exe 88 PID 4740 wrote to memory of 2764 4740 msedge.exe 88 PID 4740 wrote to memory of 2764 4740 msedge.exe 88 PID 4740 wrote to memory of 2764 4740 msedge.exe 88 PID 4740 wrote to memory of 2764 4740 msedge.exe 88 PID 4740 wrote to memory of 2764 4740 msedge.exe 88 PID 4740 wrote to memory of 2764 4740 msedge.exe 88 PID 4740 wrote to memory of 2764 4740 msedge.exe 88 PID 4740 wrote to memory of 2764 4740 msedge.exe 88 PID 4740 wrote to memory of 2764 4740 msedge.exe 88 PID 4740 wrote to memory of 2764 4740 msedge.exe 88 PID 4740 wrote to memory of 2764 4740 msedge.exe 88 PID 4740 wrote to memory of 2764 4740 msedge.exe 88 PID 4740 wrote to memory of 2764 4740 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5cb628463d191343d7bda07eb9b99038.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd747d46f8,0x7ffd747d4708,0x7ffd747d47182⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1515759091336562,15124009945009074057,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,1515759091336562,15124009945009074057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,1515759091336562,15124009945009074057,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1515759091336562,15124009945009074057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1515759091336562,15124009945009074057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1515759091336562,15124009945009074057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1515759091336562,15124009945009074057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1515759091336562,15124009945009074057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1515759091336562,15124009945009074057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1515759091336562,15124009945009074057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,1515759091336562,15124009945009074057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6792 /prefetch:82⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,1515759091336562,15124009945009074057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6792 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1515759091336562,15124009945009074057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6804 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1515759091336562,15124009945009074057,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1515759091336562,15124009945009074057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1515759091336562,15124009945009074057,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6232 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1515759091336562,15124009945009074057,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5272 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5976
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD530918e4610101b0a88f13fd4470a7453
SHA146d1e51cc0457dba944b54a49353e19e0c52f2c1
SHA256e73b8f208d0391626eed7bae6c8add5fc55515a592b956d95de2be408150c02a
SHA51220f9b9fd2b24d67f98fbf3bd3d43503e9739f0f77d90bb357ccc5d3500724c7f21aec62b93732d2bcf89583d379b24d3f3fe07478fbbfab5db72c99e6ca3f165
-
Filesize
2KB
MD5755a7efd5043071dab2ffe0aac40c8bf
SHA1c37e916ab16b809615e4fa4fb77eedef04d453d7
SHA25604f482b01bb0c1e253c32a192ec1fa5b4f4287d3ca0518bf8eaccc6e87cc82fa
SHA512b72ac08308e4ebe6e2754bd3903dbd21e040077da74296ff8c92c9d51db6d66eac750902b5708ea6d958bb13e528027d25d13d366545051d5aafaed50cde43e5
-
Filesize
2KB
MD5a205e75a0b8ac07ff2ecb0acff5e1956
SHA17d2f113f04021bb8cd5661670e6f1b938a093018
SHA2562b1ef0095a08b714ba3eab996d3edd7dbf64b8852c508e3b428e0af391f4ca3b
SHA51285e52d765cbdf48039592e477e7b7ddd5193c626d74effa1c3646df8514b96aef912df3a91a991645a7842d4372e7620c8f59d76bb200fe94b450cd01ca154fc
-
Filesize
7KB
MD561a80bbd35b5c9bfe417cbb0ee1feef7
SHA144823c9e8ae171c3322513c19d9027d4930d2729
SHA256c1d2324f6a691682524bb9ea9872c877e2feffdb4460b314dcb45deb4aeeda19
SHA51278cf9bc27aacf86bc7545fac8e2f969ff78b508eec9ee2488350e410b865c5e8f017485284d3daae05a8173d6a6ea35c440049228d8842f367095239c1417a51
-
Filesize
5KB
MD53f407a22231952792eb68b5c9671424a
SHA1e2c8702bd8a6de967cee636017f5f1c3934afbad
SHA256834194f8129abd08a11a4d7b299a3ca5a528885d282b245eae0d51dd68cede2f
SHA5125a6b81671c445434fb343cb3d11b13f402341d191999a3c1e84150401bf43c319090c5bd1b61fe8eb11833c83bbacea452cec1b3c2e24cf5d0bdf1278196f907
-
Filesize
7KB
MD5a49374a44e386139ab8f051212488df6
SHA15a56fbb91a584114328014bf683065062d87dcab
SHA25642677c1e53c7f58d8dec58480cf7307d19edaaeb01c7da2596709f1690cb1755
SHA51291341ae9a48a6b1fa6b2ab60e5c9386d10ba6c13ae640da1b3ea14b8ab4c70313402bdeb954f4a200ebd8a021876467bfacb74a04b867bc8d1788c6a61dccc2f
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD55eb1d3087106f0c256163024f9e83b35
SHA1a79492e4e9e00f0e1e63f8daf86f4384fbf917aa
SHA256563da93fc9accfa0098bf8cda3b079e812dcfe7f418d0953c8ba1410dec1df59
SHA51287ac3b2e635a7ee957d473b875d05e00b1cf5f80447cde34ec03fc549b907ad96ae3ee1a7a64d0cf399f457de3131a67ca46b5bd03050f8c68216041123980e9