Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 04:19
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_dac6c84119e01eccc7f681cd229af727.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_dac6c84119e01eccc7f681cd229af727.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_dac6c84119e01eccc7f681cd229af727.html
-
Size
79KB
-
MD5
dac6c84119e01eccc7f681cd229af727
-
SHA1
8afba2af8d9cc7d94d138afd8309c5bb5692eab2
-
SHA256
a0481b01eec3235d337403e97af40679b51b499098f641f39844be08eaa2db86
-
SHA512
a40513fae970b33a4f4183fcb39ad12d7460a63b8b3e889072e6d36b05e1a9ce7e280c1167ce2396f50036367f426218b6a6ae2a3949be129f94bf3f3884a46e
-
SSDEEP
1536:4LNCGEx04G4E63rqGg1+5X69nG3ekT3kwKTlqAbHwJs:4LNWK+3rqGg+5XCnG3ey3kwIbHwJs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3840 msedge.exe 3840 msedge.exe 3492 msedge.exe 3492 msedge.exe 4676 identity_helper.exe 4676 identity_helper.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3492 wrote to memory of 1532 3492 msedge.exe 83 PID 3492 wrote to memory of 1532 3492 msedge.exe 83 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 1604 3492 msedge.exe 84 PID 3492 wrote to memory of 3840 3492 msedge.exe 85 PID 3492 wrote to memory of 3840 3492 msedge.exe 85 PID 3492 wrote to memory of 408 3492 msedge.exe 86 PID 3492 wrote to memory of 408 3492 msedge.exe 86 PID 3492 wrote to memory of 408 3492 msedge.exe 86 PID 3492 wrote to memory of 408 3492 msedge.exe 86 PID 3492 wrote to memory of 408 3492 msedge.exe 86 PID 3492 wrote to memory of 408 3492 msedge.exe 86 PID 3492 wrote to memory of 408 3492 msedge.exe 86 PID 3492 wrote to memory of 408 3492 msedge.exe 86 PID 3492 wrote to memory of 408 3492 msedge.exe 86 PID 3492 wrote to memory of 408 3492 msedge.exe 86 PID 3492 wrote to memory of 408 3492 msedge.exe 86 PID 3492 wrote to memory of 408 3492 msedge.exe 86 PID 3492 wrote to memory of 408 3492 msedge.exe 86 PID 3492 wrote to memory of 408 3492 msedge.exe 86 PID 3492 wrote to memory of 408 3492 msedge.exe 86 PID 3492 wrote to memory of 408 3492 msedge.exe 86 PID 3492 wrote to memory of 408 3492 msedge.exe 86 PID 3492 wrote to memory of 408 3492 msedge.exe 86 PID 3492 wrote to memory of 408 3492 msedge.exe 86 PID 3492 wrote to memory of 408 3492 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dac6c84119e01eccc7f681cd229af727.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcbdc846f8,0x7ffcbdc84708,0x7ffcbdc847182⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,10028190582215060878,18244267610729776245,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,10028190582215060878,18244267610729776245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,10028190582215060878,18244267610729776245,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10028190582215060878,18244267610729776245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10028190582215060878,18244267610729776245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10028190582215060878,18244267610729776245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10028190582215060878,18244267610729776245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10028190582215060878,18244267610729776245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10028190582215060878,18244267610729776245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10028190582215060878,18244267610729776245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,10028190582215060878,18244267610729776245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1248 /prefetch:82⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,10028190582215060878,18244267610729776245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10028190582215060878,18244267610729776245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10028190582215060878,18244267610729776245,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10028190582215060878,18244267610729776245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10028190582215060878,18244267610729776245,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,10028190582215060878,18244267610729776245,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD56c54e03fd94650eae80933a423aae275
SHA1b03378c841b953bb1a9b67e47666dcb1daa5fc3c
SHA256cb24ebbb6d1eac3f4774abae3f59f92e219e37517d1a93bcb2b24ad77d238cda
SHA5127452191be7e61d8d58be2e610fb0800bbc13602c9cf5cce96cd6282b0b36d74c5671a723d2ae4bbe03eea385c568530f0475efbf1cd489e7132c469c1846824a
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5ee44ac2542e5d63a2f8c1ce4055fbeb2
SHA1f173dd0d76d41b42e06937cbf18d78463bfb31bd
SHA256b0d3e4f9b76aeb57908c21adaa3738213ff600e603a5f08ce2b08b23eb2cf930
SHA512748d0122a6a0124263976d767b59cd4409b88794164dc3d7eba97be2969b883978a2e02997d9eefdf11b00dd376de3139b3647571e2d9d91c10c84e150f9f651
-
Filesize
1KB
MD581c43aafb192d06bc00e843442728b93
SHA16fc2477e3ddeba99782fd7d3c7aedc8bd1ab90fb
SHA256e81f8b90af2e7c09676640c52be7513d3ba486429f4cd5020fc91455fc836d12
SHA512467fd7d099f5b57b96389f5af299e47f97d5b3baf8bf51cbb4fa55e10089da3504251b8cd536cc27bdb1d141e84b2a1c780f7e1ec973e6fbe9fdc0210f642e66
-
Filesize
7KB
MD5fdf24156a31666592a6dbfa0b2d9b5dd
SHA10591ddaaad9402bdb4b898f9e0dac5df61fdc032
SHA256f6cfa7804fa5a0c98075e9bcd20c2e9115357ea370b20c8e7db2ba2d6fe2e825
SHA512fcddd20f66dde93cccc8b8568c5490b1eb22a305ee0c07eea4cdd4dec16c3d6f88fd9cdceff877d3464e47da50c5521daa6db5d3bfe82125f4f2bed9d5b0e851
-
Filesize
7KB
MD53f071baf739b3a1859af75aa860b69c0
SHA1a7b044dbb9bd5e511fa0649a4ec6c9116a4871e2
SHA256eb4b910d143e189f3a97b01e344b8a00df69a67022b61b2e1242519038d6a371
SHA512e6cf7a5e6b4e0762d7a1154bb845a64c3e15e7ae80ba21db1d5b6c9deb49b889a11258ec154eebaff0a831f380a62dd1b0c7fb84600f377ca1e85bd0836497d0
-
Filesize
5KB
MD5a02dad6d5c04e4529fe102443f5f3c23
SHA1861aafeb5d870e4849382cfea585350de150c191
SHA256e1cc90583081f5210f77c1ef71dc7b9d8d69dd9cbe379c61357a57ba4624433b
SHA51201bf970a5718b33252e98d040752346f8d0c96e60ea97d36a156a393b457ad5a37c1de2a4fe331ba89ec2d050124f828122dc31d19021d30a9d727312499b709
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD560f7a9550676eec0e44418758416e487
SHA10d552bb21d76b3063d2c08763c3a3382f570c081
SHA256c6bd60e0ca52bf856f8b27a47f3182cd7692ef6df2cf75e94ddc5d1ab6e0ac39
SHA512dacbac5e0c5a1329f4c91de3a1f23ce5d45df430c12df2c5fd89ba9a24cec1bc8ca9b576a81940b0d580da595af69e7f52f93f8b0649d91151cbceaf72e87097