Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
5c49ad0eb81bcb6de8555dc16d771356_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5c49ad0eb81bcb6de8555dc16d771356_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5c49ad0eb81bcb6de8555dc16d771356_JaffaCakes118.html
-
Size
18KB
-
MD5
5c49ad0eb81bcb6de8555dc16d771356
-
SHA1
cd587afa376ce4c8fbef5f297597a137563b82f8
-
SHA256
67dd057aec51c9cd1ecc022877816d3140df596b888ee7554158882ad1f37c05
-
SHA512
c4bf7fbadd25e68269f8272bbe77babdc974e0a3d3d73c69e3b82953b9e28890cde7a40121b6221249f5cdcb32602bc6d080fbcd7026d2fc97f7191c50c20480
-
SSDEEP
384:SC+4kEiqe5pFx+hREykTOQ21PXSv0wCw4hW77fmW1271Fjp:SCvkFpFx+hRELTOQP8wp4aiTjp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 1876 msedge.exe 1876 msedge.exe 4260 identity_helper.exe 4260 identity_helper.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1876 wrote to memory of 1856 1876 msedge.exe 83 PID 1876 wrote to memory of 1856 1876 msedge.exe 83 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 3552 1876 msedge.exe 84 PID 1876 wrote to memory of 4356 1876 msedge.exe 85 PID 1876 wrote to memory of 4356 1876 msedge.exe 85 PID 1876 wrote to memory of 4708 1876 msedge.exe 86 PID 1876 wrote to memory of 4708 1876 msedge.exe 86 PID 1876 wrote to memory of 4708 1876 msedge.exe 86 PID 1876 wrote to memory of 4708 1876 msedge.exe 86 PID 1876 wrote to memory of 4708 1876 msedge.exe 86 PID 1876 wrote to memory of 4708 1876 msedge.exe 86 PID 1876 wrote to memory of 4708 1876 msedge.exe 86 PID 1876 wrote to memory of 4708 1876 msedge.exe 86 PID 1876 wrote to memory of 4708 1876 msedge.exe 86 PID 1876 wrote to memory of 4708 1876 msedge.exe 86 PID 1876 wrote to memory of 4708 1876 msedge.exe 86 PID 1876 wrote to memory of 4708 1876 msedge.exe 86 PID 1876 wrote to memory of 4708 1876 msedge.exe 86 PID 1876 wrote to memory of 4708 1876 msedge.exe 86 PID 1876 wrote to memory of 4708 1876 msedge.exe 86 PID 1876 wrote to memory of 4708 1876 msedge.exe 86 PID 1876 wrote to memory of 4708 1876 msedge.exe 86 PID 1876 wrote to memory of 4708 1876 msedge.exe 86 PID 1876 wrote to memory of 4708 1876 msedge.exe 86 PID 1876 wrote to memory of 4708 1876 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5c49ad0eb81bcb6de8555dc16d771356_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1fe446f8,0x7fff1fe44708,0x7fff1fe447182⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,6160812196555778916,776404466638340655,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,6160812196555778916,776404466638340655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,6160812196555778916,776404466638340655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6160812196555778916,776404466638340655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6160812196555778916,776404466638340655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6160812196555778916,776404466638340655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6160812196555778916,776404466638340655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1300 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,6160812196555778916,776404466638340655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 /prefetch:82⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,6160812196555778916,776404466638340655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6160812196555778916,776404466638340655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2724 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6160812196555778916,776404466638340655,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6160812196555778916,776404466638340655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6160812196555778916,776404466638340655,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,6160812196555778916,776404466638340655,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4392 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5ebbbe138b44ba42dd99a5b09bff60913
SHA116fe25cf84dc35db9e26969d28fcdc3c4f58678f
SHA256a72e931b3abc01d426bd374d111a4de1da4897178281c52daf916f5442544bfb
SHA512d7fced97cbb7be49926b8df67bd3ed4ef2b6f3b2ea980ba4e654f4ed44ffce6f8c66c12d393ab1c520bcb39326237e632f0b401bc5b1d029469b93bafe5694dc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5f38687c27cff5f997529a100a2780d1c
SHA172a539f78615e991aecbabc1967671dec153f824
SHA256fa6bfab46a0f28581fe6d2d1fc37bc34258f046eaf2263ece4fe84f5fd7b3284
SHA512bded5ba31a0a00f72dce9dda1d7fcaac203c6173465dc983a715f8211d9888c3e8bbae6d602f9240463a2811f93607771d49eeb0ceef5a9371f99d982f78a68b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD52b02f79edfc459fc248f468af8f895db
SHA1e21cc296fb985ca403a060f491678705c697f1a5
SHA256b7cf67c7851b49da85906a2266201e9d29c61419f6d65351526b72c24f1113d6
SHA512af6977073e927358ca275a3149bf8efae58c938c3a4ad7cf7e421ddc4a5b9945cc70cf49c62b01abd8b5d1fa296f25519fc1df603084f48805bbcf28c649ea32
-
Filesize
1KB
MD5c59b3401d515f11fe2a253ceec734df6
SHA1f5df76223738d6a2cc8152b58be96383f7eddb81
SHA2567a1180111dab66523f9417b0eecc94c3b8df5ff84cec4cb1c0e68d5a30e95a3f
SHA512f897931ef25bed716a32a6f898630eb0c07b8270097cac431082d88de8c9ff12c4273f078319e7cc6cd8b935d1854a8eeddc2fde5ad73842ff15e43f48e3fed6
-
Filesize
5KB
MD583fa3d410d47154077e2a9ed7d237542
SHA1cb1058caa259b3ebd870aa9c37cfcc82ba35b50d
SHA25608dbe4ea5dc99a406261f03d6a963a3c918a87ecd9e3617fb79630c685f89bee
SHA512530b2bef6fc9e0a172af2a3d29c503c55dac3d36531cccd487a7aae4ea9820545f8612aa6ef21d60111a2a06aacdc9a24aafb6d0bb3600db50dd134f5f415eb9
-
Filesize
6KB
MD5e331f4119e52a5ac83908d3fee0a30c7
SHA1ce8ae3e8ed09c503088c39667d4f4bec9dbd2985
SHA25656107360c96b5985ccf6e11725ce672b16bf7381de95cfa97c9719c2e64c7eb4
SHA5124639394814b223b58a68995f43ef1b354758953f84735610c36a5ef0e39e224794829a408a8433aea64f0dfcaec13ea8243a8009a31195877bc8fee639fe336c
-
Filesize
6KB
MD58d8c659a6698b03261646c9beb4f2ae4
SHA18ceb481b4b1ae6ff944915d318616537999492bb
SHA256f2c016c19a68984401914040d8bb855619353fe25e3a65eda97a5cf361e1b382
SHA512c5f60e35069d7061e4f1066465eee6c2cfd9cea0d565eaf4ca902a5af68cec8943d6ab3d9b2ed0bef9b3f91707b7b1feb1ea0329e9420959aaf6c469d1b54a46
-
Filesize
6KB
MD590bddae85418cc38ddeec4c76345ca07
SHA1718551dc75773b0938a5d50c37da857b72dd229b
SHA2562c2e8607de785ef763725456b2a731ac20527341f237cb7724000aa9f8093e0d
SHA51289f8358ce84c85d2f668116b08462011f8d01fd1aeb64d7d3315a7ef8d027e46a3aedb35d1089ff31f196083518cfefbeacbfda4565c187798344ce8a656f232
-
Filesize
704B
MD57e216ad3d6c52e6a19a816782ac1ab01
SHA1cf35af24492c667307d30dd6576b7b8375a95bfe
SHA2568bfd2e487377b6d11fb571f7f3cb7800aa5227b7911585c919e98c9c9109b8bb
SHA512f864326d128f7a7c4c9abfa948d9834e39f7c28d3693b816d0e437469e9b5575f951e609cb9c41e72bd7effebd3fca62ac1f7ac053edb7b0fbb4b8d3c178804c
-
Filesize
704B
MD50882cd948ed758fd0a8678c443c79494
SHA1a37796eceb886eb18cdab434bdc05c6931e797ed
SHA256525565c51ebb0a3c47110be088f5fe3c74fe23242eb64b545b05a9b9ac426e87
SHA512a7f0885b6949e2d70d33afd6143288109be57057ac111dcc6d3d066bceb739d02fb63a0e96960c6ff8d67c0229cd7153110ac3dcb2ed64121ec1e4eee40c5bc6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54b7b2e8447e1c56b0431ac215ab17e2e
SHA1e464a5b0e9947350c21490bbb37a5d010d21f1fc
SHA256a9f5da38f104e55d585f95941d278a939641c25c2b73cde3c3265a39edea924d
SHA5125049010b1dfacbd8dad0d5278ee904a7b457955541312d6ad49c817006efd43fc1dde5c9c3132f850c70b9410f75144780d500ace9044208c30490221e934aea