Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 10:45
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9b7a0811f9f1dd8d28636e9d23a88e45.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9b7a0811f9f1dd8d28636e9d23a88e45.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_9b7a0811f9f1dd8d28636e9d23a88e45.html
-
Size
191KB
-
MD5
9b7a0811f9f1dd8d28636e9d23a88e45
-
SHA1
d47c852ec09c99b0fd15b6a6d9003d46067c734a
-
SHA256
5108d1a11bbe322fb3f7035b4507085694a98165673ab8209d6fcdd6f78e6806
-
SHA512
1a48f86f408658ecc4bfa2c0f17caa60f3e029bf204ee33bd9a9df3463e39d921c1eef1e24c424645fdbc4ea546d66704b6b24d7f4b163eddec06b1e8ab21df0
-
SSDEEP
3072:uFYGe3/ToeqbIrqbI59U13G4k5QhLpOatVDzeIo8ik2Q5MIsuQyf5bTM+MdBXpKE:aI3cIIIW3G4k5QhL8atVhiVQ5MIsuQys
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 2140 msedge.exe 2140 msedge.exe 3120 identity_helper.exe 3120 identity_helper.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2940 2140 msedge.exe 83 PID 2140 wrote to memory of 2940 2140 msedge.exe 83 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 208 2140 msedge.exe 84 PID 2140 wrote to memory of 1476 2140 msedge.exe 85 PID 2140 wrote to memory of 1476 2140 msedge.exe 85 PID 2140 wrote to memory of 4936 2140 msedge.exe 86 PID 2140 wrote to memory of 4936 2140 msedge.exe 86 PID 2140 wrote to memory of 4936 2140 msedge.exe 86 PID 2140 wrote to memory of 4936 2140 msedge.exe 86 PID 2140 wrote to memory of 4936 2140 msedge.exe 86 PID 2140 wrote to memory of 4936 2140 msedge.exe 86 PID 2140 wrote to memory of 4936 2140 msedge.exe 86 PID 2140 wrote to memory of 4936 2140 msedge.exe 86 PID 2140 wrote to memory of 4936 2140 msedge.exe 86 PID 2140 wrote to memory of 4936 2140 msedge.exe 86 PID 2140 wrote to memory of 4936 2140 msedge.exe 86 PID 2140 wrote to memory of 4936 2140 msedge.exe 86 PID 2140 wrote to memory of 4936 2140 msedge.exe 86 PID 2140 wrote to memory of 4936 2140 msedge.exe 86 PID 2140 wrote to memory of 4936 2140 msedge.exe 86 PID 2140 wrote to memory of 4936 2140 msedge.exe 86 PID 2140 wrote to memory of 4936 2140 msedge.exe 86 PID 2140 wrote to memory of 4936 2140 msedge.exe 86 PID 2140 wrote to memory of 4936 2140 msedge.exe 86 PID 2140 wrote to memory of 4936 2140 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9b7a0811f9f1dd8d28636e9d23a88e45.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ea8346f8,0x7ff8ea834708,0x7ff8ea8347182⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,3868467460815018528,18440327839245561574,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,3868467460815018528,18440327839245561574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,3868467460815018528,18440327839245561574,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3868467460815018528,18440327839245561574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3868467460815018528,18440327839245561574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3868467460815018528,18440327839245561574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3868467460815018528,18440327839245561574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3868467460815018528,18440327839245561574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3868467460815018528,18440327839245561574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,3868467460815018528,18440327839245561574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6484 /prefetch:82⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,3868467460815018528,18440327839245561574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3868467460815018528,18440327839245561574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6228 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3868467460815018528,18440327839245561574,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3868467460815018528,18440327839245561574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3868467460815018528,18440327839245561574,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,3868467460815018528,18440327839245561574,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
20KB
MD52ebfdbd309ee762211b4a2ac39708c4d
SHA1b002922c672dbe1dd4caa02af24d0b1e7da616af
SHA25654ae97d445b166859fe3ba6241b97abbac0aa0d158c72352b774d60ba3e81797
SHA512d1687b7a6da07a72963c96a1e85661046d3d3c96f88445302afa09721fbe211a5fb8881ff14b346b0ebe8a20f5ced21979e9f58e256427e57b85d565bef17720
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5229b31f9f8722b097cda1f2847401dcd
SHA1eef9143002bd3a20ebca624a67f1b0e54073dac6
SHA25667c607dbddd8a57937827607c8a91517a1e5e38393f0d6a5573a8c05ed295076
SHA5127a4b1cfff7f5a9197b8a881f131d849c8032924324fb81f9f2fa1aaa15b28fbf21e8a6afa77d93b4459194c7a03e5760c1abec98ccdf173627391158639639df
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD57e2a3a627372d5a33a76ee6864af977d
SHA13ab1b4fc19668606dd025cf4038c3f02effbcaff
SHA2561147d4fa2ad0eefe49231779f5f39c6fad469c62d613b9488b3fe260d261718f
SHA5122a3e857c15c3f2e7c01679d55a22ea874720fe4365f64d85ecabc87807d1981643ee073e64bae6edc827cefec45d8abd8c33c44a5bfecd887d2eb86900e529bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5ea48139ed9366d2e50b5220de453a791
SHA12a9ca80a2c9e5eee0e48105e99e250697c234e37
SHA25638965d27ef05f475ec700a4e110ff650c3d04458413bda429045381d06018494
SHA5125f890ba43061f162c55a28bd93f32aad19040f8af2a780f27fda23d9b9f0ac0e46acc09e15b706ce69ca9ed1e3c2a3fd741ad85f62ebe2cf68fbe4f90e87780e
-
Filesize
3KB
MD532060d6102b1e2e5f23d49fd85752517
SHA1684f1d864f5a8beb02dcdba661956ff414c27fe7
SHA2569226a8009ffdfbd9e213fd699b94bae0705af843bffc8f720e80d6c47ceb765b
SHA512b328895fd6dfbb6f5b13532d054e962398ffe6fb87603ef29fad1b032517496ee3f3329d353aec3159d172d5f97b5fd9e67d9c960e0f7f1542b870cd15fcc803
-
Filesize
3KB
MD5b32f2d7d160df19ff9b1bbf690cd6b3b
SHA100e783f3951410af90d9d33d0650ef46b97ca4ac
SHA2563a5e218e1f8fd6b716a71ca7c690f706374b3393409f684c488e026bec2ff28f
SHA512911df35c992173e67c2b5b740740099331df3ad4aed97416b7ad18dcfcb26cf6e2fc31e8257576aca4f43c7ea53baa05f71e9680de7856ded4e208a5779e6eeb
-
Filesize
7KB
MD5db15ea68666fcd979864be7e022a3cc1
SHA195a8cd8cff3f9e19b6a1f6baf04a1225097ba212
SHA2563330f31839bb27b1687467ee63738328f232d63d97fc687a5eee1c430feb246f
SHA512c6fbc50344536c4dfe9f03c8a6d248333535789d841843ab3716f83e577d2605f665fed000d832093616890e0c0f2b792f24d6be997bf2b2af6b33a66f00b15a
-
Filesize
7KB
MD5d522ca20ad6cf1eb6c4b903a34171e41
SHA1210a440fb72b6979fa87512cc438654031c3f54f
SHA2564290c34ed2ab3a85195dfc57d9c13784d2cd3257bb0f6c4dd8cb5b6f7703ba7e
SHA5128fe4de4c07e7d82aefbc830c29d0914f2addbef50be162968775ae823965be88b9bb5039b1ca22d1be597e761c0fb2f6b6b4c1903023f395919e24365351b28a
-
Filesize
5KB
MD5c15950f22120b7e23d501b7b7ccb4fa3
SHA13d9c0c92d9049c22268528f886fb2cd307b90a66
SHA256914b32ca2cd8604103fc9ee4222eec3d7c88dd4f926c780cba32ca9be7ec4ab6
SHA512b4195b46d476bd756a05f57e85a87b412c739e38e9819f2403b5bca09549d53769e2d336433ddffc7a0f1272990a2ee738b8991129108831f751d3cc78e20384
-
Filesize
8KB
MD5975a5a461b1067645dc78dce7f73b114
SHA18ea70a9eab6136cfe90c4a3cf7b79c986416ab8d
SHA256dddeb91b76e7bd50cd263243628253c1499bc85d24c8f358a7d1ab9e769018cb
SHA5125639b2145ce691d3927c26c6b2c807a7cc821128d063de02733a336252ea0b1a563a0553559951cfea4e792e51f11273506eb5967077c36930070c67432957f8
-
Filesize
8KB
MD55cc6a480abb794266cfa50ce504fba61
SHA14844e93e63cdf1a9e12cb6f12396ca5a4ac4f168
SHA2565a59dcd7078d2c7874c9f68499a5873e4be94ad573e9ec212b289139b0d131b3
SHA512ac3007b0c7805b1d45e7716c44ac930239285d33ce8b26bc8d514d1b9ab981c637c4045a4ea661350e164e14ecad3d70a334ec8ff4af232a0076404fdcf3e956
-
Filesize
706B
MD5c9261df8ef993b74706ce97bc55a532a
SHA111e128b3f13e6c044346958dba198ce751fe34dd
SHA2567b63df9b289c611847fdd0fe8e33c6a32c15b6292dc04e798adae755b66a7de6
SHA512a4cf785a31592946b8ec82fe43d29659d26d777af890e658d8fed46a5fa815448f3642cb847659b38e098603db19601f7baff5aa00aceb964c258f2a5e2f2acd
-
Filesize
371B
MD58ba2c755f2954980a599b9b5147ad6a1
SHA171dc0a8ba5b491920e7dfd6b4453bc8d1829fe72
SHA25672ff87261457a7713f9c35cc89888e702c150809bb44b564cf7b8a0e36c53974
SHA51298169e6e7fc92b05bb9b4e6052b2cfa69163af1a9ff88a7515f48701c90694126066ad1199c45dc0b8e753ee79417e217fd486598ac6cf7843355db7b0c924cb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e345173a3bc70fa7b3bdcedcd13141db
SHA12c893fe0d0c952d98c5191ecdb842ba6288a996c
SHA25630453f2977b88f434e34a177addabe874744a499bda171aba8818aea0441900f
SHA5127c72668cf7681d23bcd35187771e29aaa2f844cafec8a7b16f7a4f53eb3e22ca1c28484e119b6f5b0796a7d7c2a31cfdec312adfc473a691d3defd1deb4a6508