Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 10:12
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9a15334a6f6d877f97a55692bfd049e3.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9a15334a6f6d877f97a55692bfd049e3.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_9a15334a6f6d877f97a55692bfd049e3.html
-
Size
51KB
-
MD5
9a15334a6f6d877f97a55692bfd049e3
-
SHA1
fc871426716e9cc356d032ea97fd20c614a86904
-
SHA256
133e3e2401858b20a5342c93d25fb9b305c7c209a0266e35209605c3f203d562
-
SHA512
961060b20da7ef890902db1164bca09a9c4130f5a023fc3c398967f7fd8166ca339df4789027f010a800d18ec235e6b41d224a6afcbfd439f415269a09893881
-
SSDEEP
1536:ylpx187NJge9tQPgUbS8rnESbcKi9i6+aTrzv23UQvJKYp3Smb/s9:ylpANb8bSWnJ6+aTkUQRJp3Smb/e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 548 msedge.exe 548 msedge.exe 3484 identity_helper.exe 3484 identity_helper.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 548 wrote to memory of 4664 548 msedge.exe 84 PID 548 wrote to memory of 4664 548 msedge.exe 84 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 3352 548 msedge.exe 85 PID 548 wrote to memory of 4548 548 msedge.exe 86 PID 548 wrote to memory of 4548 548 msedge.exe 86 PID 548 wrote to memory of 2308 548 msedge.exe 87 PID 548 wrote to memory of 2308 548 msedge.exe 87 PID 548 wrote to memory of 2308 548 msedge.exe 87 PID 548 wrote to memory of 2308 548 msedge.exe 87 PID 548 wrote to memory of 2308 548 msedge.exe 87 PID 548 wrote to memory of 2308 548 msedge.exe 87 PID 548 wrote to memory of 2308 548 msedge.exe 87 PID 548 wrote to memory of 2308 548 msedge.exe 87 PID 548 wrote to memory of 2308 548 msedge.exe 87 PID 548 wrote to memory of 2308 548 msedge.exe 87 PID 548 wrote to memory of 2308 548 msedge.exe 87 PID 548 wrote to memory of 2308 548 msedge.exe 87 PID 548 wrote to memory of 2308 548 msedge.exe 87 PID 548 wrote to memory of 2308 548 msedge.exe 87 PID 548 wrote to memory of 2308 548 msedge.exe 87 PID 548 wrote to memory of 2308 548 msedge.exe 87 PID 548 wrote to memory of 2308 548 msedge.exe 87 PID 548 wrote to memory of 2308 548 msedge.exe 87 PID 548 wrote to memory of 2308 548 msedge.exe 87 PID 548 wrote to memory of 2308 548 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9a15334a6f6d877f97a55692bfd049e3.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa048146f8,0x7ffa04814708,0x7ffa048147182⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,7836428165651560039,18087812928947692192,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,7836428165651560039,18087812928947692192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,7836428165651560039,18087812928947692192,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7836428165651560039,18087812928947692192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7836428165651560039,18087812928947692192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7836428165651560039,18087812928947692192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7836428165651560039,18087812928947692192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7836428165651560039,18087812928947692192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7836428165651560039,18087812928947692192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7836428165651560039,18087812928947692192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7836428165651560039,18087812928947692192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,7836428165651560039,18087812928947692192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,7836428165651560039,18087812928947692192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7836428165651560039,18087812928947692192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6644 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7836428165651560039,18087812928947692192,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6508 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7836428165651560039,18087812928947692192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,7836428165651560039,18087812928947692192,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6416 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,7836428165651560039,18087812928947692192,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD56e5a1c87fce907d81a388a6b61ea58f2
SHA1cba0202de6a0c814728b2fe545907ba55351c0e2
SHA2560d266f1e1169d3b40c61fdbc263baf0bd9e3065d18583ea6c95cdb6501219dc5
SHA512171e1ba93b7d008280e85b5b0813fecdfadac2d5c1edbce9ad524cf49027b7cf5e55406659bb1be309a2a513bcfbdb8303a99c738a0adf520a69fbc3c959cd6a
-
Filesize
2KB
MD586971fe5abfc6de53b59967a218a8102
SHA1149315f5f71ff270544c45b85a9adadc5cea8156
SHA256a939a90f861270519df3951bba992f67a2dbb1ee56d2b0103efe208921597ede
SHA5123959de078e6b15086979df8d436ac63b2e7586f558c2fb914171cfd4260a0ab8d8732f9ee7a1762b71a1de9c5fc222b1ff09f551c1097a896a5428c7c63004e0
-
Filesize
5KB
MD518618dbf7ad6d64fad405f67a6a1180d
SHA1192a197a225c323d9b25d9ad0fe0850d9499b258
SHA256c720dd2ef5bfe8ca2fd22b7120d91efc88176a7948cd094d004e95e8e43f5878
SHA512161a75d383107828d0a89a36b6cd38de5003571c69ea7fe55c35d2bc085448e9e91a2722307b291b0a99dfdc5b508ec49a6d49a03c2e8d6b53d6af80e49b79bd
-
Filesize
7KB
MD54520924cbb9bc3fcbb89afd11f4d9740
SHA1933ca2c70aee51fc344f096416e50e12bb3ce6c7
SHA2567cf25703d09d195476ce27d15d50355e9a26b36d8fcd06406ea40ec7b909ead1
SHA512cfdc9cae96f975c68d46d3f5c645b33f7b215d66bfcda94db84135ce842df6441c8b1f015a5d01884c216a951a0c80d56ebfc286b848827537a3c6673abe5a41
-
Filesize
7KB
MD5bc33bf449b2af258e631391958391d5d
SHA18c811d0e5d4a304a4b027ff70448dbdbc898b6f9
SHA2566b2521bd730512e29c3ccb5c07e84b7bcf522d9e1411a7aa4d21910061d28342
SHA512345735df843c0cd83beec74ec92ec88e7147fd0cf55cf5ec007d7a53df4a9daf8879ad2f9c088f7e10324a7edd04c74eaf807a0e3dc33d5e62bcfa9514db2317
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f0f78760cf73bb4b2c753e983f5d336c
SHA14f760657e4e88e5bae6deed4e117fdc6c1931efc
SHA256377ed8f64e93d2f02ed6547b9ef90b303674ae7cf7cb394c0c1932751640fa95
SHA5121ef5cdbe1735cd086808dea0a040f896941727db68711b4f4caae8b4338fbb5ccf9b037946653d2b0c49aeaff471b2a3131e28d02e11441e971d3f2a3b494d46