Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 08:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_fb89af5c474952050c8cb8526fc3251d.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_fb89af5c474952050c8cb8526fc3251d.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_fb89af5c474952050c8cb8526fc3251d.html
-
Size
274KB
-
MD5
fb89af5c474952050c8cb8526fc3251d
-
SHA1
61f3821da3c26e496d0b1f3a23fd0b2fd67b0c3f
-
SHA256
77be97b3120d68f8748b59b923888b75815ac2675ba43e811ee21ac17e26a2d8
-
SHA512
62eb46e12c34a57c48555086fbb8bb5c89a8f544365cab47ed58ba36a33a51b322f094ea0137798589d811f969b144626387edf86dac5a3a0d04b42b0998ec08
-
SSDEEP
1536:kQ5wCePE7vbpZzbERwcDXw6gKQPtd5n+mVljV8KnFA:kQfnE1Xw6gKQPtfljqKnFA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 4680 msedge.exe 4680 msedge.exe 4660 identity_helper.exe 4660 identity_helper.exe 5904 msedge.exe 5904 msedge.exe 5904 msedge.exe 5904 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4680 wrote to memory of 2988 4680 msedge.exe 83 PID 4680 wrote to memory of 2988 4680 msedge.exe 83 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 3996 4680 msedge.exe 84 PID 4680 wrote to memory of 5112 4680 msedge.exe 85 PID 4680 wrote to memory of 5112 4680 msedge.exe 85 PID 4680 wrote to memory of 3096 4680 msedge.exe 86 PID 4680 wrote to memory of 3096 4680 msedge.exe 86 PID 4680 wrote to memory of 3096 4680 msedge.exe 86 PID 4680 wrote to memory of 3096 4680 msedge.exe 86 PID 4680 wrote to memory of 3096 4680 msedge.exe 86 PID 4680 wrote to memory of 3096 4680 msedge.exe 86 PID 4680 wrote to memory of 3096 4680 msedge.exe 86 PID 4680 wrote to memory of 3096 4680 msedge.exe 86 PID 4680 wrote to memory of 3096 4680 msedge.exe 86 PID 4680 wrote to memory of 3096 4680 msedge.exe 86 PID 4680 wrote to memory of 3096 4680 msedge.exe 86 PID 4680 wrote to memory of 3096 4680 msedge.exe 86 PID 4680 wrote to memory of 3096 4680 msedge.exe 86 PID 4680 wrote to memory of 3096 4680 msedge.exe 86 PID 4680 wrote to memory of 3096 4680 msedge.exe 86 PID 4680 wrote to memory of 3096 4680 msedge.exe 86 PID 4680 wrote to memory of 3096 4680 msedge.exe 86 PID 4680 wrote to memory of 3096 4680 msedge.exe 86 PID 4680 wrote to memory of 3096 4680 msedge.exe 86 PID 4680 wrote to memory of 3096 4680 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fb89af5c474952050c8cb8526fc3251d.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1b3f46f8,0x7ffd1b3f4708,0x7ffd1b3f47182⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7682491041104979350,11919091909882960387,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,7682491041104979350,11919091909882960387,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,7682491041104979350,11919091909882960387,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:82⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7682491041104979350,11919091909882960387,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7682491041104979350,11919091909882960387,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7682491041104979350,11919091909882960387,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7682491041104979350,11919091909882960387,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7682491041104979350,11919091909882960387,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7682491041104979350,11919091909882960387,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7682491041104979350,11919091909882960387,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6460 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7682491041104979350,11919091909882960387,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6996 /prefetch:82⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7682491041104979350,11919091909882960387,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6996 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7682491041104979350,11919091909882960387,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6852 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7682491041104979350,11919091909882960387,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6636 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7682491041104979350,11919091909882960387,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7682491041104979350,11919091909882960387,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6364 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7682491041104979350,11919091909882960387,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5904
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5747325cfa9f93c28f5313c7dbdfeb63a
SHA102a9e231df0fe8698096a5d01bfe653810687a00
SHA2569fbc633b7487617b229a59d5e6705a48c8d7aa672e60d2ec15fae6cff53cc3a2
SHA5127b0edb41222bb2f47aed327b3e38bf381be01735e13fa48868db9e5c8bb6a2944b8efa10c2450637666d1bee10fa6e87fca19ee1c7d57aeebe9ca2d277ad7bd4
-
Filesize
3KB
MD5a05da6981249c531b220fe73ce46153b
SHA1e0b5e5b2ac3dee3992cb862e3eabd06a1ef0a2e3
SHA256719550fafaec908f482111d4faf352bf43c87e55e30cab8ec5ad5a1660a1c260
SHA512996828afdaafac71ba9366a99533b0c42e66617d9d2bd391f08d8237fca1bfef46e27e17482fe45471dcb2901f8b14461151f4ffe27fa867fa31ccbeb32856da
-
Filesize
3KB
MD520fae3d6f75645aac5a3edd9ab6327d3
SHA1040685ac5bd9801656e8c8d3de99a90349cab5eb
SHA256627d06c37c70d9be2ab40c0cdefa351cf7332e971aa33df6e23152b1575ecd17
SHA51271dcd48e7fbf10ca753ae320554e3e04e7eca98a3c741f2063128f5476e6b33aed984d00057ddf5336f700f8d5e01974da2b13e612581f21a19f2716a10b7a51
-
Filesize
5KB
MD5ad1da900f2a2a51b3fe23fa553a01e3c
SHA1ffed9b5b4e4c061d8ea7c553f3115856e4848519
SHA2560a704f654b75f85d67af7bb94954872f4764dfcbc40f06613073b5c564158ef4
SHA512cd489065446c331efd3eeda0ca0f6f708084d34d22005ca88fe5a92f977c538f1c0f317ac5e97eb7d825d72cc88ab8d3ab1aebf94bb412e89f9ba6062f4ab35a
-
Filesize
8KB
MD50e8ce6aea659a1d5f8c7bd2199608bbf
SHA1e6ecf2f566697f0e368f556448ea8dee638d4ebe
SHA2569eed06b90625b16f5025483ab94b6ff12597c17119cd79d658ddba5b68f0f147
SHA512666eafd97066e450b6c0d699b5f956d6d7b77008cb2701925682b7d9896094c04a71b99ac8636c5d2063f9beb72a0c68a4314d27d2619498cb754c064dfe1c17
-
Filesize
8KB
MD5370b497ac60f22776d272d3691ec4d0d
SHA196cf2dc4bd4e160d7e9c8adc8a5ee711a7cf4ee1
SHA256c0b6b932e5ae6c8170f36921a1af6aa69fe47d4253cd9b8c22baf6f75eb38ff0
SHA512e05550cb51220181161cf284eb40823c7d0872d4b966ee07bf344bf97fac97dc03c7a4ab0db5d961edc71d92b1b732d9f0c097a5b48030ff49b6cec906c931ca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5639bcabdbd4c70daa4ef96bcd916567d
SHA1f5150947f86e465103e5e7a9fe047e5c757a9289
SHA2560a081178ea809baf478874d4477be5606ab06d1076cf18b337313558679fc0e0
SHA5120c9b2299a369a539cf0bd89934f9c71836df6c7764843dfbd7a2e21ebe73aa32a9f5a2739459a2c56b830d33e4693dc0fac4a37206467107dd64a40e0815a1fc