Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 21:54
Behavioral task
behavioral1
Sample
JaffaCakes118_2ffad7be347cd6a7de63f6b6ee3fb227.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2ffad7be347cd6a7de63f6b6ee3fb227.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_2ffad7be347cd6a7de63f6b6ee3fb227.html
-
Size
63KB
-
MD5
2ffad7be347cd6a7de63f6b6ee3fb227
-
SHA1
a77ab732d70c90ee258918246fc932738d772f71
-
SHA256
29ce4dd0d1b69815d67be68fe5c733790f3b5d09e99ef1ccea69c19bfa0c5974
-
SHA512
63b464ce194670c2dac82340a4be675e2e0f538dd949b416714fe691db307f8c16e5715618f61ff8e0e357df87fae5ade3253970d4f2df1eea5f643e92be89bd
-
SSDEEP
1536:/v8JlbLVodnhHGodnhHvO9iEVLXXqlU0tpj:gPVodnhHGodnhvU0tpj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 2284 msedge.exe 2284 msedge.exe 2352 identity_helper.exe 2352 identity_helper.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2476 2284 msedge.exe 83 PID 2284 wrote to memory of 2476 2284 msedge.exe 83 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 4824 2284 msedge.exe 84 PID 2284 wrote to memory of 5000 2284 msedge.exe 85 PID 2284 wrote to memory of 5000 2284 msedge.exe 85 PID 2284 wrote to memory of 5020 2284 msedge.exe 86 PID 2284 wrote to memory of 5020 2284 msedge.exe 86 PID 2284 wrote to memory of 5020 2284 msedge.exe 86 PID 2284 wrote to memory of 5020 2284 msedge.exe 86 PID 2284 wrote to memory of 5020 2284 msedge.exe 86 PID 2284 wrote to memory of 5020 2284 msedge.exe 86 PID 2284 wrote to memory of 5020 2284 msedge.exe 86 PID 2284 wrote to memory of 5020 2284 msedge.exe 86 PID 2284 wrote to memory of 5020 2284 msedge.exe 86 PID 2284 wrote to memory of 5020 2284 msedge.exe 86 PID 2284 wrote to memory of 5020 2284 msedge.exe 86 PID 2284 wrote to memory of 5020 2284 msedge.exe 86 PID 2284 wrote to memory of 5020 2284 msedge.exe 86 PID 2284 wrote to memory of 5020 2284 msedge.exe 86 PID 2284 wrote to memory of 5020 2284 msedge.exe 86 PID 2284 wrote to memory of 5020 2284 msedge.exe 86 PID 2284 wrote to memory of 5020 2284 msedge.exe 86 PID 2284 wrote to memory of 5020 2284 msedge.exe 86 PID 2284 wrote to memory of 5020 2284 msedge.exe 86 PID 2284 wrote to memory of 5020 2284 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2ffad7be347cd6a7de63f6b6ee3fb227.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbcc2046f8,0x7ffbcc204708,0x7ffbcc2047182⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,8685928986019416657,11560453405785651061,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1984 /prefetch:22⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1956,8685928986019416657,11560453405785651061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1956,8685928986019416657,11560453405785651061,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,8685928986019416657,11560453405785651061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,8685928986019416657,11560453405785651061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,8685928986019416657,11560453405785651061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,8685928986019416657,11560453405785651061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,8685928986019416657,11560453405785651061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,8685928986019416657,11560453405785651061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6164 /prefetch:82⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,8685928986019416657,11560453405785651061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,8685928986019416657,11560453405785651061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,8685928986019416657,11560453405785651061,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,8685928986019416657,11560453405785651061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,8685928986019416657,11560453405785651061,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,8685928986019416657,11560453405785651061,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
20KB
MD52ebfdbd309ee762211b4a2ac39708c4d
SHA1b002922c672dbe1dd4caa02af24d0b1e7da616af
SHA25654ae97d445b166859fe3ba6241b97abbac0aa0d158c72352b774d60ba3e81797
SHA512d1687b7a6da07a72963c96a1e85661046d3d3c96f88445302afa09721fbe211a5fb8881ff14b346b0ebe8a20f5ced21979e9f58e256427e57b85d565bef17720
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5f52729429ad4700077f44fb3cf415273
SHA19140cbffd3a8b43fb31a6167660e363799ec665d
SHA25649cb261cb6e9d58d3793d377c28ae2249194a64fae7c9903d8e49f60ee7d2ef9
SHA512deead318260acdf73b6ab4926949aa83f9a50353c5d6a376352b3ed99768b74759e53e6fc403872084ea6f559f16fb9c268d2fae2d8e907f4b1b9618e1383bfe
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD522bcfed7c9ab5e1ab4c161fbd6fb6724
SHA1c4cdc00c390f16072bd06a30afc0a525669fea3b
SHA256e3a014782ee507c1a92cc5d7bb7184152debd4b597227a3316d2870856c9c49d
SHA51293f0044f726b4fd2ccaaa6b1b560fcf61e7af4ce9e5da7a7d66f00cfaf832c0b28133be41857e0838c57b0424b09fd865b83813ea2f33b22c34de7a33e24fe2e
-
Filesize
1KB
MD5aab9a27ec5b27313a5a323793c631ec4
SHA121f307f63ccd30e66953b60ac4385e831092f9ff
SHA25652e108031dc8a1848b02d6d913608c0ae742a3031366653fc68d9a6884c265f4
SHA51253d6dbf64dc1cd04a62e5e8666cf8fd4f995e5cdadbec261bb529befb13cb1c52b01a91e0711b4af4037d772105d685e9bde748559d6c0b994bcd5f206709d17
-
Filesize
7KB
MD5c9be962e56cead96b90647632325f640
SHA147cb8977bb86c1a62057a5cff7245df888e6ffad
SHA2561c7a4a96feaa2bfe213df0703edbc2badba53870196f2d2d933b498059f5351a
SHA5122cfdced6389af7316cb9ef727f685e156bdff6c5098ef26590c2f57f11fe276c055c0a451744e781e4382dc0a051e5bacff6d39bf0f1fd04239f04d542f1bd22
-
Filesize
5KB
MD578b4efd41cdd4109ae408b94ad5490a8
SHA1f044dd6862615a3c8b10de170d598a18066c9375
SHA256b01e84990992b2740a02b04cefb66c5785f528c6db94f2f100f872056949717b
SHA512c41f21c1fc6d9917bffdb6ad04c33b0e48ccd355b15dfe0c669bb9c81f9fe8d1aed4a143e2381edd30728ab084960bc56341b112ffb7ed2dd4d3854f7f373197
-
Filesize
7KB
MD5a26772b1cc92b2880d9d6cb67f03e8de
SHA162803a0b583b758008ba7ed909da2bc856d38e31
SHA2567ae64f911120ee0ee13aaca210d9c9fcd8bbec722a17d82326b62301cd340223
SHA5121c0223d178dc5a69425d4d53b39ddacb979f90ef5b6c6713ec8948de90a6bf3bdda453a786d248c5d301014bd3f53360a474282fe5adf60fa87248a5a0fe902e
-
Filesize
6KB
MD51e8ffc48f3e4c9c6fe52fc425ea30361
SHA15d40cf4fc672e367bb92462cd80961c45f197f7c
SHA25631b9bae49dada4b69e203d0b03f41f2986a0bdd61279ffae905cbc0f5e995d6a
SHA512042d1d7dc56384e31724391d6ac801b064130da72ba480c331835bf58313e86c15cbf5d373d2662f8da3bb0edada88d0d51f04070bddb0c204772d3a6a2a8b86
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD577b76aa308aff38f5c1164dd3a5933bf
SHA1eb3101cb31069716f86764d59a0cf799c8611665
SHA256553b416ca65bce40eed0b3399fce975c6eaa5e48cd6dcc3cf00b884f667116ba
SHA512ed220cfad8817bf6619317d18c4eddb3b6656260942cb5745e90e1b506b95e395fc8b4c3b03a2af630e0086253303476e6881f70afad4dd5351a3e785d225cf0