Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 21:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_eee1e6533961be9cabf422f0e6efb6da.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_eee1e6533961be9cabf422f0e6efb6da.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_eee1e6533961be9cabf422f0e6efb6da.html
-
Size
60KB
-
MD5
eee1e6533961be9cabf422f0e6efb6da
-
SHA1
bc3095238c951eab44d9258912e4b09213ace75a
-
SHA256
7839bb8c43f783c99bc3031432fc3073dfa4ec746509d823137f658a5201e872
-
SHA512
bdb3bf9398ebf9e9311f194280aba1f0152c92873de950cc254528cb95ad4ea4a7f474147edfeb6d4426940cf0d1b4066782ee386faac023caa96be80fd70e49
-
SSDEEP
1536:1nUXKh4KpB3fgSTg2M2mQ3jCQr232vP2wk2N2jCpoSV5K2OLBEk6JVS2E2D2c22e:1nZ4KpB3fFzTSBKqJ1iOOX/YkaBT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1076 msedge.exe 1076 msedge.exe 1888 msedge.exe 1888 msedge.exe 644 identity_helper.exe 644 identity_helper.exe 5476 msedge.exe 5476 msedge.exe 5476 msedge.exe 5476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1888 wrote to memory of 536 1888 msedge.exe 83 PID 1888 wrote to memory of 536 1888 msedge.exe 83 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 4380 1888 msedge.exe 84 PID 1888 wrote to memory of 1076 1888 msedge.exe 85 PID 1888 wrote to memory of 1076 1888 msedge.exe 85 PID 1888 wrote to memory of 4944 1888 msedge.exe 86 PID 1888 wrote to memory of 4944 1888 msedge.exe 86 PID 1888 wrote to memory of 4944 1888 msedge.exe 86 PID 1888 wrote to memory of 4944 1888 msedge.exe 86 PID 1888 wrote to memory of 4944 1888 msedge.exe 86 PID 1888 wrote to memory of 4944 1888 msedge.exe 86 PID 1888 wrote to memory of 4944 1888 msedge.exe 86 PID 1888 wrote to memory of 4944 1888 msedge.exe 86 PID 1888 wrote to memory of 4944 1888 msedge.exe 86 PID 1888 wrote to memory of 4944 1888 msedge.exe 86 PID 1888 wrote to memory of 4944 1888 msedge.exe 86 PID 1888 wrote to memory of 4944 1888 msedge.exe 86 PID 1888 wrote to memory of 4944 1888 msedge.exe 86 PID 1888 wrote to memory of 4944 1888 msedge.exe 86 PID 1888 wrote to memory of 4944 1888 msedge.exe 86 PID 1888 wrote to memory of 4944 1888 msedge.exe 86 PID 1888 wrote to memory of 4944 1888 msedge.exe 86 PID 1888 wrote to memory of 4944 1888 msedge.exe 86 PID 1888 wrote to memory of 4944 1888 msedge.exe 86 PID 1888 wrote to memory of 4944 1888 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_eee1e6533961be9cabf422f0e6efb6da.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabb3246f8,0x7ffabb324708,0x7ffabb3247182⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,14183357540498037188,13079270771543008739,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,14183357540498037188,13079270771543008739,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,14183357540498037188,13079270771543008739,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14183357540498037188,13079270771543008739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14183357540498037188,13079270771543008739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14183357540498037188,13079270771543008739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14183357540498037188,13079270771543008739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14183357540498037188,13079270771543008739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14183357540498037188,13079270771543008739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14183357540498037188,13079270771543008739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,14183357540498037188,13079270771543008739,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6804 /prefetch:82⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,14183357540498037188,13079270771543008739,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14183357540498037188,13079270771543008739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6444 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14183357540498037188,13079270771543008739,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6468 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14183357540498037188,13079270771543008739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14183357540498037188,13079270771543008739,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,14183357540498037188,13079270771543008739,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2692 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2880
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5f67c5a23e6aed1e90a7fe9cb76aea8c7
SHA15aadf22c5885e3bbf631902e4ed5f5c455ca5bd0
SHA256d4edbcca243378ccd77a2e01891345c0a219a52c4ab38c679c3124e77f5daabf
SHA5123e94799db37413da1c322fe40146f9c853d4a0aaccc75f0e4666d93df77168cf89d0bdf4d23371caf51c5b6018821101b1524935f00ddec0a96811c6b490710c
-
Filesize
2KB
MD5e20f021afd98c1adffddf8ac838bb9b1
SHA184c04907da967ba87db79406a31e10b0ee0c2ca0
SHA256a389e424c5ab0a89d4e8256903cbc6a63403331a0c538605b6eb3d8144228b16
SHA512523dbb02fa3641fb00131479630cd2d02d2b457120af35143515180a91b2edde51d989e3bdb97fc23395a3e168a5a501f38f9c00d56be9ae230b810eb39f770b
-
Filesize
2KB
MD54d13b2dcc55a84e3c7dc26da6ed6e5e8
SHA122a68e71e38e035e0af92d7892d7cad8eafb96f5
SHA256615eeedf2fe597ca7b7428ab3d4d4365876b8ede0afaca23f824e193907ccee2
SHA512aed8d81e5a60cab783a184d7fa326a7fc02b7b48e4957f191ce6f26de87fd0e3242bb7d140e2fe4768b5569455e89c0fbc83cc0248a31a3cd03fc8360991f234
-
Filesize
5KB
MD5e0b05cb8e24be3f5ad4156fcafcf1f93
SHA16da4b227c8daa6c4448346c8a4d0d224b4802e39
SHA256ef7c0bdd826bd35c5a6d7bce51e59bac54391c30f88affda53c424ca409f6fa0
SHA512adaae3d9c4e5c029e05f46d35c797f94c622c99bc2619d1ee9fd55a0ebf97ce6b916beaf39414c2fcb7305091d403c69b98ceaf1e0a028a08b5abdedb7b05530
-
Filesize
7KB
MD54ba199fb072efef9155936ad66a9b86d
SHA15794970ff025d831434ffd6f02464e7e7feacd46
SHA2564b6bd4c96379e3c74a5c167795265bea08ac87ecd6496e3da91535424f5f44c2
SHA512608f6681637e8b29aee041cc7c16a227621fd3a41daca82670fe2708899930c83224416298131084af7b9d81d29dc3d977ba242add65444b239b0c3b4d64bae7
-
Filesize
7KB
MD5bef309eaf49e73c6cad72baaaf71806b
SHA10e749f274e8e80e109a70893a2a598514968d5c9
SHA2567dc51a2a419f22b62afc62bf8dbd27c88d1ad7e4dafeb1e016d0cc9eb808c9a0
SHA512e5597ff945d06d96bbfb94712a2905629d1883ee2cbe9ab9ce25a89305cb82c962edde98d49e879dccc0ff9bd2aacc8d47d15a55bd09fad297d8c4c5cf37c2db
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e4300e60d55a9965c671bc660ef6bffd
SHA118aae619540bb9f4da31562a9d94b0262bbf6bdf
SHA2561bc930e69447267a38c360f46f5170b71e0761b7dd5fd1a95b5880cef1cb6ea1
SHA51251cff0b78fffc2d66623c8e17b46424774376402e4244c171c7e3c7facf83d8d3242aa1bc07f7231ac7c0f05f8b313d8968134431dc58bdf0d43a7f305ffd905