Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 19:56
Behavioral task
behavioral1
Sample
JaffaCakes118_170e97f03423bf8a7a84d6057dad49f5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_170e97f03423bf8a7a84d6057dad49f5.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_170e97f03423bf8a7a84d6057dad49f5.exe
-
Size
1.4MB
-
MD5
170e97f03423bf8a7a84d6057dad49f5
-
SHA1
3e45d91bb12efce8c6e60996992a84bdf42700cd
-
SHA256
1a5659b4058453430099abf6ac6e529ee6b5d7a8a66b4d0c88cd3886ce64e920
-
SHA512
40ebd228efc29ee1db1414ba5919b55f688e3d209753bf2fa821005fdb918a960864bde6f6f565ef6a946fdb16c0c9ed8e94bda2c0ecac26eaf7c05aad00afed
-
SSDEEP
24576:unC9EcJUzxJ6ansf96hkBVa7zzDOFunCWrlE8rfZ+0:u8dmj6CsUzSAnCeE8rk0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4152 msedge.exe 4152 msedge.exe 1704 msedge.exe 1704 msedge.exe 3404 identity_helper.exe 3404 identity_helper.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3276 wrote to memory of 1704 3276 JaffaCakes118_170e97f03423bf8a7a84d6057dad49f5.exe 90 PID 3276 wrote to memory of 1704 3276 JaffaCakes118_170e97f03423bf8a7a84d6057dad49f5.exe 90 PID 1704 wrote to memory of 3516 1704 msedge.exe 91 PID 1704 wrote to memory of 3516 1704 msedge.exe 91 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 3692 1704 msedge.exe 92 PID 1704 wrote to memory of 4152 1704 msedge.exe 93 PID 1704 wrote to memory of 4152 1704 msedge.exe 93 PID 1704 wrote to memory of 4132 1704 msedge.exe 94 PID 1704 wrote to memory of 4132 1704 msedge.exe 94 PID 1704 wrote to memory of 4132 1704 msedge.exe 94 PID 1704 wrote to memory of 4132 1704 msedge.exe 94 PID 1704 wrote to memory of 4132 1704 msedge.exe 94 PID 1704 wrote to memory of 4132 1704 msedge.exe 94 PID 1704 wrote to memory of 4132 1704 msedge.exe 94 PID 1704 wrote to memory of 4132 1704 msedge.exe 94 PID 1704 wrote to memory of 4132 1704 msedge.exe 94 PID 1704 wrote to memory of 4132 1704 msedge.exe 94 PID 1704 wrote to memory of 4132 1704 msedge.exe 94 PID 1704 wrote to memory of 4132 1704 msedge.exe 94 PID 1704 wrote to memory of 4132 1704 msedge.exe 94 PID 1704 wrote to memory of 4132 1704 msedge.exe 94 PID 1704 wrote to memory of 4132 1704 msedge.exe 94 PID 1704 wrote to memory of 4132 1704 msedge.exe 94 PID 1704 wrote to memory of 4132 1704 msedge.exe 94 PID 1704 wrote to memory of 4132 1704 msedge.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_170e97f03423bf8a7a84d6057dad49f5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_170e97f03423bf8a7a84d6057dad49f5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=JaffaCakes118_170e97f03423bf8a7a84d6057dad49f5.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xdc,0xe0,0x104,0xd8,0x108,0x7ffa213c46f8,0x7ffa213c4708,0x7ffa213c47183⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,9803478714162042424,12306148468199991289,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:23⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,9803478714162042424,12306148468199991289,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,9803478714162042424,12306148468199991289,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2980 /prefetch:83⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9803478714162042424,12306148468199991289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:13⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9803478714162042424,12306148468199991289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:13⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9803478714162042424,12306148468199991289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:13⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9803478714162042424,12306148468199991289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:13⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9803478714162042424,12306148468199991289,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:13⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,9803478714162042424,12306148468199991289,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:83⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,9803478714162042424,12306148468199991289,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9803478714162042424,12306148468199991289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:13⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9803478714162042424,12306148468199991289,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:13⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9803478714162042424,12306148468199991289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:13⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9803478714162042424,12306148468199991289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:13⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,9803478714162042424,12306148468199991289,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3792 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=JaffaCakes118_170e97f03423bf8a7a84d6057dad49f5.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵PID:4540
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa213c46f8,0x7ffa213c4708,0x7ffa213c47183⤵PID:1124
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5ee00a8356bcae1780567122233203b13
SHA1905cc6c01e03e67cd22ee8a0ae8c2e4fccc08354
SHA256c669fdb3bb4e228495c8f4e47a40f268b866b6c5cf87574a0c2e2be65585eb08
SHA5125704bd7617b2df1bfdc9b1a506bed7889719a01dc6680db170178d87afe7e5115eb297323b7f9b70c60d52b9a436fa70a203baef90af6954ff8fe878db7c83a7
-
Filesize
437B
MD505592d6b429a6209d372dba7629ce97c
SHA1b4d45e956e3ec9651d4e1e045b887c7ccbdde326
SHA2563aacb982b8861c38a392829ee3156d05dfdd46b0ecb46154f0ea9374557bc0fd
SHA512caa85bdccabea9250e8a5291f987b8d54362a7b3eec861c56f79cebb06277aa35d411e657ec632079f46affd4d6730e82115e7b317fbda55dacc16378528abaa
-
Filesize
6KB
MD5549b4ad3ad6c8dc0aae786345f4cbd2c
SHA105adb47fbd8ea8f5fe85d10ea7938a5457cd5ddd
SHA256e3e4fc46b807378d1e60b6689662ff49453589763f7a80efde519fd2e1c861cf
SHA5124a211737de5d393783e70e52a1a7ac85d9370a31ce81bff4a8f2da210ddc2b48e1b7e1496491c9558a476b548bedb95fcc30108c4402ec06aa110421c3596356
-
Filesize
6KB
MD562eb728415e0c7d12ee8ab516630f18d
SHA167d9c6d8ca6a6bdaeaa3f6d2cc6948e6c7145e25
SHA2567149f473e381b87ae4cd84827cf920d1bb874d19625f0f70216858a5cf4d596b
SHA5129b36d7a2b83a72edc8e995c14aeaaee2eeaa9d62752617d1e5a0eacfcc7088026419037cc7d296faa93ee73c3b77fa9bb46f0462296b9a3efc3508a950233baf
-
Filesize
5KB
MD53a2ec8ccc785e54e3c47c8c3dde7437b
SHA1f4f2d60a88a1d4cfd3af8db773bb441d34956c3c
SHA256adb4e7c9e8f8e83672a838adbeda4075fd9e9c9409e26b15eb2be1c7b583249a
SHA51215b27200a0210339d7e6f427b10f2fcf0775da1bf10920bf57ddcd07cdeba2512b2370fd43fa554ffc3e59898fbab682bb12a3d733842f27167fccce1d18c120
-
Filesize
371B
MD533c3b8eada3215e57546f2bc2dd38e31
SHA1e573d16f351b97f58798c68303dccd3e334000c9
SHA25698c367d4d9063819550c84e99120ebb510df8c96348c9c9ca44eb86e3175360b
SHA512efbf10972a064ab043d3bbb26dcab588fa9051531cc8d331945fe58f3de085802710629de37d0b5bb4f29b6fa645780b5ec4c7fcbdd1c20952141e1a9224b6a7
-
Filesize
367B
MD5a52d3717f006d0e30506304c389322af
SHA1de89ffc34ad13091f07ffad58eeaf1b29dc6e973
SHA2563b283f876e736a3178f0d577494da358656c423e81de39c2ce2c6f53e559967c
SHA512582ee869a18b0a6cc9139cfdb3eba6fb3b782af3f4c1ba91c0532545cdd3c862d430e1d4342ac8b86d120fbd2662c0d5c4c850aa5be9b8a1005ab0de5fc50d49
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD554611e5fa0118e33ea08204e0bcf6e5b
SHA15a96e4afce1e4258df5f0f19ea67b6a8a68e0a63
SHA256ada75e52673f4508e44c85469ebd33b2353a9d3c5b41e5f21ca3abbe564464fa
SHA5121ce4ade7492874264a44a777cbb61eac647f4b6d3eaf2b32140691bd534070d7c627da6cf6e0c0c8b8182545e2e6ac4d2005a36e180e1f5ed65206c536139400