Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 06:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f9d530958dccd8a13a2165a982101c02.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f9d530958dccd8a13a2165a982101c02.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f9d530958dccd8a13a2165a982101c02.html
-
Size
79KB
-
MD5
f9d530958dccd8a13a2165a982101c02
-
SHA1
e5f690c4a7fb24e641e37b791737b62c310703fb
-
SHA256
d85dcf08b8fe09ddb11aae18fea901f200e08d6e6cfafe2bce1454e933a91691
-
SHA512
253efd7ba8e860eec7f9231f6604fffc30cc79a93b96d8763b3ebc8a14f81ba40ccf8cbe141d386c65885e17c44edc76384f1481158e9c12230a22ef16f648b9
-
SSDEEP
768:6H7GtVWV/o8bZKfZgFMnizPIzxlqJZTfGRDvLcyf86XJXqyRmjXy9qM6ZtoVfhsu:oKWV/PbZ0gFMnyI6JgRDvLB8wE+DLgi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2932 msedge.exe 2932 msedge.exe 4808 msedge.exe 4808 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 3732 identity_helper.exe 3732 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4808 wrote to memory of 1760 4808 msedge.exe 82 PID 4808 wrote to memory of 1760 4808 msedge.exe 82 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 4476 4808 msedge.exe 83 PID 4808 wrote to memory of 2932 4808 msedge.exe 84 PID 4808 wrote to memory of 2932 4808 msedge.exe 84 PID 4808 wrote to memory of 2160 4808 msedge.exe 85 PID 4808 wrote to memory of 2160 4808 msedge.exe 85 PID 4808 wrote to memory of 2160 4808 msedge.exe 85 PID 4808 wrote to memory of 2160 4808 msedge.exe 85 PID 4808 wrote to memory of 2160 4808 msedge.exe 85 PID 4808 wrote to memory of 2160 4808 msedge.exe 85 PID 4808 wrote to memory of 2160 4808 msedge.exe 85 PID 4808 wrote to memory of 2160 4808 msedge.exe 85 PID 4808 wrote to memory of 2160 4808 msedge.exe 85 PID 4808 wrote to memory of 2160 4808 msedge.exe 85 PID 4808 wrote to memory of 2160 4808 msedge.exe 85 PID 4808 wrote to memory of 2160 4808 msedge.exe 85 PID 4808 wrote to memory of 2160 4808 msedge.exe 85 PID 4808 wrote to memory of 2160 4808 msedge.exe 85 PID 4808 wrote to memory of 2160 4808 msedge.exe 85 PID 4808 wrote to memory of 2160 4808 msedge.exe 85 PID 4808 wrote to memory of 2160 4808 msedge.exe 85 PID 4808 wrote to memory of 2160 4808 msedge.exe 85 PID 4808 wrote to memory of 2160 4808 msedge.exe 85 PID 4808 wrote to memory of 2160 4808 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f9d530958dccd8a13a2165a982101c02.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb89746f8,0x7ffbb8974708,0x7ffbb89747182⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,15529131616040869996,16655719855803550287,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,15529131616040869996,16655719855803550287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,15529131616040869996,16655719855803550287,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15529131616040869996,16655719855803550287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15529131616040869996,16655719855803550287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15529131616040869996,16655719855803550287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15529131616040869996,16655719855803550287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15529131616040869996,16655719855803550287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15529131616040869996,16655719855803550287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15529131616040869996,16655719855803550287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15529131616040869996,16655719855803550287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15529131616040869996,16655719855803550287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,15529131616040869996,16655719855803550287,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2328 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15529131616040869996,16655719855803550287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2148 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15529131616040869996,16655719855803550287,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1700 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,15529131616040869996,16655719855803550287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7424 /prefetch:82⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,15529131616040869996,16655719855803550287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15529131616040869996,16655719855803550287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6976 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15529131616040869996,16655719855803550287,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7036 /prefetch:12⤵PID:1680
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD50d99e3afaa1f08e88709097bbbbd3697
SHA11a211f69580112cd2e8b586246d360eacfa8cee7
SHA2569eb8663578c098868c1fbd0dee6501e4ddb5e23a35b0ba7f398f60aef05f687c
SHA512ae2efd3ff4efd6f8a3dc6e8789f3f50a0d297a11f2d7def70268f1e926bd7273e3ceb52633952a499ec21ce6ae31657e9471f95b21a62fa735d7818c90b78ebd
-
Filesize
1KB
MD5007682044d52f79514f7694d158290dd
SHA12fe55977346ddf1f548a6925f24235d50602321b
SHA256f035c6e30ca770c05450e17edc3599751f3a99c209f2a90117bd7ad3277b40aa
SHA512b7edf524b30a35bfc01b0d20602fe0c413096b3ade4882814969c414d8bd79d90d0db246e1ac787e127a9422ee0f0b28348835544bd33a9ac32799824fd37255
-
Filesize
7KB
MD5dc096ae5e2a49fa3958096c4ef4169e6
SHA13fb140b307ffa183841a2e6c1d5cdcb451b0ad6b
SHA256450057266314a4b488d8d8e6caa8e103251d26ee1cd45947b7ecce20256ea1fd
SHA512c7547f545f9d6ca6b2a1e5664e8ceec1daff9566edac245485b8ad3fb9d02480f92668dee231a7bceaba73c7bf56161b112177f947ef7fd71fe7539afa6333a2
-
Filesize
5KB
MD53a0d388cab362e876552e56ef996e60a
SHA1daa79e5e0944b86c152162ce9265d19a7bf8d00e
SHA2565a393666fe7682d92a01566253add321e6155dece5db871a41aedf02ca62ef27
SHA51246c57380a95f22982ba090b35a6c507d84b637a9e2b015955b21edb885bdc6ce539afac443f9b04592e09f98f3d75da00ec729300d49dd626cc03ef026f5b6ae
-
Filesize
7KB
MD59424044fde5767fa890ea1af6b6611b9
SHA1579cce8d0c12992ad71070d45e166216e8447ef7
SHA2563cd30deaa32fe57345c5e1a44f5f171aa210c39634cc0a2e67b5d0d201af99c4
SHA51261755652efa092ee1baace6ece081c658d99506e6bfc029dfe91664474c727ba4dce74bacdb1a61613f6c14e2f68cd33623b26ae82bcf7ab42566c6c4d722bbe
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD54fc6fe7aa8482f6d3ea149f4cb448e85
SHA1f53bd8bf990b5d439f1305d5aec59972c9f1dc47
SHA25610d1154cd33db765b4521b793f9ffef62b7a4b53b38d573c8f95c0c9ca437e68
SHA512fb4b8035d77fe2df11456759c7872ed7959cb7fa6aaf602424e20fa17ae6dd81e61f5ef5c3b8caf543a46fc87d58960512560778653db1ae1c5151ac3280dd49