Analysis
-
max time kernel
144s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 05:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f7d6a0850ebdcb602ac60862dba07447.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f7d6a0850ebdcb602ac60862dba07447.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f7d6a0850ebdcb602ac60862dba07447.html
-
Size
80KB
-
MD5
f7d6a0850ebdcb602ac60862dba07447
-
SHA1
e6bd61023541f59fd6d1df830719bf55bccdde49
-
SHA256
a1b44158abe4ae64514a8be433cecc42bed43f3eccc96a0eb607136adf5360fa
-
SHA512
c1478c6746a707d12fe864903cfe2f2e7b175d3b5dc3db900930a0467ba77ead18cd022a46125deffce54d6ddc5550abd701ece1430773648c62c7a065d2ba9d
-
SSDEEP
768:1H7GtVWV/o8YGKfZ+s59nizPIzxlqJZTfGRDvLcyf86XJXqyRmjXy9qM6ZtoVfh8:RKWV/PYG0+s59nyI6JgRDvLB8wE+aLvF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4596 msedge.exe 4596 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 3732 identity_helper.exe 3732 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4596 wrote to memory of 2396 4596 msedge.exe 83 PID 4596 wrote to memory of 2396 4596 msedge.exe 83 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 880 4596 msedge.exe 84 PID 4596 wrote to memory of 4316 4596 msedge.exe 85 PID 4596 wrote to memory of 4316 4596 msedge.exe 85 PID 4596 wrote to memory of 1132 4596 msedge.exe 86 PID 4596 wrote to memory of 1132 4596 msedge.exe 86 PID 4596 wrote to memory of 1132 4596 msedge.exe 86 PID 4596 wrote to memory of 1132 4596 msedge.exe 86 PID 4596 wrote to memory of 1132 4596 msedge.exe 86 PID 4596 wrote to memory of 1132 4596 msedge.exe 86 PID 4596 wrote to memory of 1132 4596 msedge.exe 86 PID 4596 wrote to memory of 1132 4596 msedge.exe 86 PID 4596 wrote to memory of 1132 4596 msedge.exe 86 PID 4596 wrote to memory of 1132 4596 msedge.exe 86 PID 4596 wrote to memory of 1132 4596 msedge.exe 86 PID 4596 wrote to memory of 1132 4596 msedge.exe 86 PID 4596 wrote to memory of 1132 4596 msedge.exe 86 PID 4596 wrote to memory of 1132 4596 msedge.exe 86 PID 4596 wrote to memory of 1132 4596 msedge.exe 86 PID 4596 wrote to memory of 1132 4596 msedge.exe 86 PID 4596 wrote to memory of 1132 4596 msedge.exe 86 PID 4596 wrote to memory of 1132 4596 msedge.exe 86 PID 4596 wrote to memory of 1132 4596 msedge.exe 86 PID 4596 wrote to memory of 1132 4596 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f7d6a0850ebdcb602ac60862dba07447.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff84a846f8,0x7fff84a84708,0x7fff84a847182⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:22⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2784 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1788 /prefetch:82⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1788 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1876 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1192 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,4790743986441409693,9634597255828175542,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7136 /prefetch:12⤵PID:1996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5b1d4000868c4d9247eded7ff264d1240
SHA133b1b311836b6429722d121393cbd53197bb3d0c
SHA256c1c1d27de397d360c4dacbf5a7900eaf9b83f48a818d0c48b44fc00938f45c3b
SHA512269748fbe163983469aecd7cea31740a71847fa675bce9cf67464cc1b6d822610c4c7bb73c5c301bf54ee2bd5e0f80ffcf14b56551bbe39c666403038c05052c
-
Filesize
2KB
MD53a05668f08be350cb2c1d5543aa2b7c0
SHA1c043d902ee46e5d546ace35e33ff81639a119882
SHA256f19bd1a95a72b87ee4ef29c3fffd35b58544b38295c5479b56b9fba7098b195a
SHA512a99da9261498fefaa9c83cd4bf86b8fbb0293e78e252b7a0c81e8b3b5d4db352857ca93bf1186632119b6ade0990ebca1d0ecd3629956e6dd2489f54388ccbfe
-
Filesize
5KB
MD5d0713713b2bfa496add3af4df19ee6fa
SHA158f8351714cb28e13ff574bcb1c1b82f6ef3992d
SHA25664b933d999c57b0305f17321dddd4c25624955cc6f2582590dea4973b69ab527
SHA512521eb28c393f329ec01fcad6878ad0b00fc0c02473453d84cccc82a9537c67eb7cd08efd4184774d058231e006b6106281191df2906cf373bdf2c38934f49392
-
Filesize
7KB
MD5d1a7a5424400b8e240ea7f5b90ce9a6f
SHA16d306c6490d7174535401161407fc50a6aa91d16
SHA256e25f36bec8566497b60f99c943e3d5a21c8af653913372fccbd4584981e270e5
SHA51260d77de9ad94ac923a8900ee29681855995c6fde90ed8cf8dc9103d955ff2b5d52a6ff38482c5fc58be88b0be713a6f74e6842191ce59641d2f463889a74edd3
-
Filesize
8KB
MD5f9076648965760639fba37c29de59d65
SHA12a21e8aae3c4428963403baf124dce96675d6ffe
SHA256c80e074b0e10e3c62480dee8c2f8eea53b6b634ce58a8a34b472081256abe72a
SHA5127c19021bda59e67d001a2f4e6dccdb445313fb95b85bf4f5fb7294236e3342a871259eb2ce6105b1f0b7a9c829b498491a58bfd9dceb7b4236585e9771606091
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d9d35b4da01916f21e9e8bb214f847b3
SHA169cd1430bea02674b9e714bb1fb5a09b64d4a95a
SHA256c32dd57dd004ad523acc351c0f27f558c9292fd53e2b3821cedccdf8e6cad571
SHA5126bb40abe522dd239b998ca9a41f6b1ead324069c044fffbbd1e7652a0ff3e15e9aa2434bcc4aac4348a523f6d13c531d2d64f7be1d4efc9c275b0265f5fe254a