Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 02:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_877164238200e455ff739ee4a885ff7e.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_877164238200e455ff739ee4a885ff7e.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_877164238200e455ff739ee4a885ff7e.html
-
Size
121KB
-
MD5
877164238200e455ff739ee4a885ff7e
-
SHA1
a4d92b7f5c4c60783020963ba7577260e4a6e53d
-
SHA256
9d5fda16ad842aa0a66da985c5df77b7fc63cb7dd43e6292998f6a0fc05d3870
-
SHA512
c9268144b72e7de37f180cb2c23efe2da42d79d3c06d6d36c1bcecdd75b3c37798f7500f6dfb4072e618c663062e8635367539b87acbd16b9d6f2660b5b1005b
-
SSDEEP
3072:LFnqbIrqbIVfLBuK/dVvCtAch7EAYKpNg8sqbh:BsIIIZyAcPP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 1112 msedge.exe 1112 msedge.exe 1488 identity_helper.exe 1488 identity_helper.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1112 wrote to memory of 4568 1112 msedge.exe 82 PID 1112 wrote to memory of 4568 1112 msedge.exe 82 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1940 1112 msedge.exe 83 PID 1112 wrote to memory of 1492 1112 msedge.exe 84 PID 1112 wrote to memory of 1492 1112 msedge.exe 84 PID 1112 wrote to memory of 4180 1112 msedge.exe 85 PID 1112 wrote to memory of 4180 1112 msedge.exe 85 PID 1112 wrote to memory of 4180 1112 msedge.exe 85 PID 1112 wrote to memory of 4180 1112 msedge.exe 85 PID 1112 wrote to memory of 4180 1112 msedge.exe 85 PID 1112 wrote to memory of 4180 1112 msedge.exe 85 PID 1112 wrote to memory of 4180 1112 msedge.exe 85 PID 1112 wrote to memory of 4180 1112 msedge.exe 85 PID 1112 wrote to memory of 4180 1112 msedge.exe 85 PID 1112 wrote to memory of 4180 1112 msedge.exe 85 PID 1112 wrote to memory of 4180 1112 msedge.exe 85 PID 1112 wrote to memory of 4180 1112 msedge.exe 85 PID 1112 wrote to memory of 4180 1112 msedge.exe 85 PID 1112 wrote to memory of 4180 1112 msedge.exe 85 PID 1112 wrote to memory of 4180 1112 msedge.exe 85 PID 1112 wrote to memory of 4180 1112 msedge.exe 85 PID 1112 wrote to memory of 4180 1112 msedge.exe 85 PID 1112 wrote to memory of 4180 1112 msedge.exe 85 PID 1112 wrote to memory of 4180 1112 msedge.exe 85 PID 1112 wrote to memory of 4180 1112 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_877164238200e455ff739ee4a885ff7e.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffebdd546f8,0x7ffebdd54708,0x7ffebdd547182⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,6963430738685504942,1400628298491809436,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,6963430738685504942,1400628298491809436,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,6963430738685504942,1400628298491809436,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6963430738685504942,1400628298491809436,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6963430738685504942,1400628298491809436,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6963430738685504942,1400628298491809436,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6963430738685504942,1400628298491809436,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1148 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,6963430738685504942,1400628298491809436,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,6963430738685504942,1400628298491809436,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6963430738685504942,1400628298491809436,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2224 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6963430738685504942,1400628298491809436,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6963430738685504942,1400628298491809436,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6963430738685504942,1400628298491809436,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,6963430738685504942,1400628298491809436,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD57b40469baae2fa5541f254c4944a64cb
SHA1d5bc41cf1719267388f113e95afcb03beed42f34
SHA2564c5af6374afb4dcd3bd48f853075ec075d6d22f55475def373fd7970a48c6c2b
SHA5128a3a33b55dffdd676bb3caa70eb522bc753de1060872003e754333a6383891fb7816f78f40820bb252ded1781dc4f0e511c1b3feae2150f9fe1547eb860f445c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD565011095d05762d412b4140842dbabff
SHA177008f2e0cae24d98ac24d0dd22cce45c1c2eaea
SHA2564f97cd543a3b37c7a43dd70d597b15e33ccb9317a6d2d14a2d248fff7ed7e317
SHA512217cf9f7f9231c55c5516cd800e4493439600be09302dd40878f9da2ef048cf98266a47c25ca6370512afa039303e0817008609a5113b19985f7aeccf9adf0d6
-
Filesize
1KB
MD539b665ced01cc7a6485b6a2add32dcca
SHA169ec3f059b9bc9c24bb424d790a96562faeda5fa
SHA2560105c3619aa5fe352c9f755dc97556cb357735993b9b698c71756e8210e8db03
SHA51225b0237f579ac999d13be959844c7f81fb86a673993514dc3891eae3b2ae976c972c927caa252c1431829d1f47e8539719bd06555365d4f86ba7997d06c950e8
-
Filesize
5KB
MD5364a9294a7d3a7a5cf4a2136167d5801
SHA138f4f0d608a6ddc19371bae505558fa870d6ea93
SHA25658616201ee0a751a68887839b0870c843a11fa757275281301cac6c6de9474ce
SHA512cd4c790a718baf2c5264ecfc499b84167f71c4057ba0ff7c74316a7955c5c9ee48b9c640200db0cc654a80dfb78445bac1a1ebe5c94a0a4d9e812c4ea6d5142f
-
Filesize
6KB
MD569b71a8965e163c7e7684718fc2dfa8b
SHA1e865ad98ff551dc006fc71b991b058a06979e056
SHA256d4355f058bbde28f461acb7993a31b21a0368be163687bb2578fdc362f03e944
SHA512e7daf21e0822068f77bd005467256c814f8c442720c259bda45f7a4bce5cf27a26eed98c3d3531d425d2ad17c4a4aaf7964c829239f5845e85bc3298f27a0ae7
-
Filesize
7KB
MD5a7499823a5bd487c950603ac5dd9f6b7
SHA11a169df44fa31c7fbe31872ccbee7da03161d1c9
SHA256b12edf5bf45d68e044b479ac296d8e2dbdbc8b9c8bed11b82ba6a5530db91921
SHA512daa660be441dabef40363e271f65ab2fed27ddd76b860fc8c647578c6ad4884a2da65425acd6c53dcbdb12a406b425b159acfe5dd58991a485ab236e792d5d73
-
Filesize
537B
MD5f013a9ad0a86c0c4e0c83f8980df2681
SHA165364a61fa528dcc580c684295ca59b5717bf06f
SHA2567d0abfa9cd4832fe197d5bbb6a9771dd82af7e0151ef529dd809354d8c4f4fad
SHA5128f4349bfce9ee79cf08383a12e977bf059b94bdb2a0eb7097756787ba3398ce0418526c1d2549bfb158f3551a3b3d25355c373f058f7b14054ee13672e5c92ed
-
Filesize
537B
MD5b763e0eb2902e6b6b833f5bd119caf65
SHA13514de1c4fd48c7ea71091784b87e81f770dcc2c
SHA2560a342d9de971a6dc851c6146b8d5ceab527b78df87f2a5395477102584ff27e5
SHA512f29c9b7d3cc195922799050e092bdb9434e78b645f206e76fe159dc0746e306fe3be7f5a046f42b7585340cf1ebb0359f64e6ddd30976c637c4d15f79c0d5cd5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c6b82789-3b94-4cb3-a040-a6b2a9aedcd1.tmp
Filesize6KB
MD5e9584ba427b9b3674fc2e4239b5bbc59
SHA1a3ffea98f57c520cf221db3ce67ef42ba37fffb6
SHA2568a2c1b0161dfce8366aab24933c821f31a1ae73005e1cfdb97f3c775d79cedaf
SHA512b57c54f1420b4dd5537e21f44b796fa9def11557549fbada1d14003c0165ccdef2613150db19fcb27a74fd2cacf1fba6b3bd2360ef2dddf01a2fbbe7142d5487
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD580d2c077547bc3e0097ebaa66c448b18
SHA115a5a908bb8bd9fca0a441763518b5b8d168c4dd
SHA256a9c9069689ae6d1dc5d0355c19a8245baa5dfd8f9dd82abc2ed72c8983e9614c
SHA51218d378e7028f744befe2ede19e00dc64d11675d792a331a484154f49aea9e5858793e20a9cc8bffcd8edd47e205070e19c13fe15b5d2277b34ae5160ab828c0b