Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 18:39
Static task
static1
Behavioral task
behavioral1
Sample
b49d26d944da8a0b3122f7caa6bb1bb2_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b49d26d944da8a0b3122f7caa6bb1bb2_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b49d26d944da8a0b3122f7caa6bb1bb2_JaffaCakes118.html
-
Size
175KB
-
MD5
b49d26d944da8a0b3122f7caa6bb1bb2
-
SHA1
046755260db2657aa18fe1d4061c035f0f8bc557
-
SHA256
78581fc0a2b3a91cf20411e061b60ffeb7e9d441bfb279e425e7528a127e103f
-
SHA512
8d1f2fa000298def66a49ed3046d054cdccfca46582d090ccd550568e475e0750acf37390f97ca45efe173d2e41f71c41511914a097dcb1b39cfafeef9d20540
-
SSDEEP
1536:Sqt98gd8Wu8pI8Cd8hd8dQgbH//WoS39GNkFEYfBCJiZw+aeTH+WK/Lf1/hpnVSV:S9CT39/FxBCJijB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5032 msedge.exe 5032 msedge.exe 2648 msedge.exe 2648 msedge.exe 4740 identity_helper.exe 4740 identity_helper.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2648 wrote to memory of 1164 2648 msedge.exe 81 PID 2648 wrote to memory of 1164 2648 msedge.exe 81 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 4744 2648 msedge.exe 82 PID 2648 wrote to memory of 5032 2648 msedge.exe 83 PID 2648 wrote to memory of 5032 2648 msedge.exe 83 PID 2648 wrote to memory of 1768 2648 msedge.exe 84 PID 2648 wrote to memory of 1768 2648 msedge.exe 84 PID 2648 wrote to memory of 1768 2648 msedge.exe 84 PID 2648 wrote to memory of 1768 2648 msedge.exe 84 PID 2648 wrote to memory of 1768 2648 msedge.exe 84 PID 2648 wrote to memory of 1768 2648 msedge.exe 84 PID 2648 wrote to memory of 1768 2648 msedge.exe 84 PID 2648 wrote to memory of 1768 2648 msedge.exe 84 PID 2648 wrote to memory of 1768 2648 msedge.exe 84 PID 2648 wrote to memory of 1768 2648 msedge.exe 84 PID 2648 wrote to memory of 1768 2648 msedge.exe 84 PID 2648 wrote to memory of 1768 2648 msedge.exe 84 PID 2648 wrote to memory of 1768 2648 msedge.exe 84 PID 2648 wrote to memory of 1768 2648 msedge.exe 84 PID 2648 wrote to memory of 1768 2648 msedge.exe 84 PID 2648 wrote to memory of 1768 2648 msedge.exe 84 PID 2648 wrote to memory of 1768 2648 msedge.exe 84 PID 2648 wrote to memory of 1768 2648 msedge.exe 84 PID 2648 wrote to memory of 1768 2648 msedge.exe 84 PID 2648 wrote to memory of 1768 2648 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b49d26d944da8a0b3122f7caa6bb1bb2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97ed846f8,0x7ff97ed84708,0x7ff97ed847182⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12207930195736994291,1951570929990286222,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,12207930195736994291,1951570929990286222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,12207930195736994291,1951570929990286222,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2480 /prefetch:82⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12207930195736994291,1951570929990286222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12207930195736994291,1951570929990286222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12207930195736994291,1951570929990286222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12207930195736994291,1951570929990286222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12207930195736994291,1951570929990286222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12207930195736994291,1951570929990286222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12207930195736994291,1951570929990286222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:82⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12207930195736994291,1951570929990286222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12207930195736994291,1951570929990286222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12207930195736994291,1951570929990286222,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12207930195736994291,1951570929990286222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12207930195736994291,1951570929990286222,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12207930195736994291,1951570929990286222,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2424
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5cb4547009928b50ab427a3260e5ec293
SHA1d71d0e8a1786e52f409cda3111b5fc2a22bc23fe
SHA2568525ebd6f126bd0911f0c363abe4fa2f1bf669de4a1bf2d3abf208530fc1423c
SHA512290d4196a5f6044d1ee29c684ce9ca1644dbe52e84ed9f610b7308a05a0dc1a659b380c1431bd30f6ed587c998efefd75a98ea13de55a5c0286388e8969b0fdf
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD557cc3bd02dd286489cc6f9a1d36060fa
SHA1449de28353f4bb1a06a08d865586c7f9f680890e
SHA256f5a5e4afefcd7256bd7d32d0c2816b9515c70160b50da2c495af9c26b7e66a76
SHA512ca8427f6352b003938e7dab7767ae318f7249a4c34bdcb64e1a0a3e6f245c9272150f504010dd7f148c7d3aaa11cd74ba70e14fac2ea004a11940224f4e2167f
-
Filesize
2KB
MD5379a3a9b0ca05a7ccc868d3e09c0a762
SHA13c89f381aea6ac8d4e47adaeb2e2c9e21adbedeb
SHA256fa327d0acfdde121fd1a182324644f1f96d9c02574370072e0611a6c86962f83
SHA512cae180a0262a9572f26a38aad6682c8a8602221d9ab523fc0a6bcdbd999b113853e2e0bca8ea864ce010e7a0d914893aa8e206d35df7c4c98f8c589995baba87
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD5656ce902333c414609718c5f06fa6cc4
SHA19d1763ff113b18cd7b74d48c8acb9dc50da42f90
SHA25699e53c93b22f23079fda20136e00a3d68dd1fdbdd25df68358a6dfe36ff7f17d
SHA51278c781a2b510b9d3e3405d50c7bb42797b04f262909d519d20be2615221ec9d34561c70f3764fa31f753cb921eac06749ef263c8e6b97edf821ea5826de23aa5
-
Filesize
6KB
MD526f5121ba3d47903e8cf1a5288487ee7
SHA18fd17b075c937d387a8a02be509c77eb38bac414
SHA256b51ba84f853a06c15dd2f1c470261c518c1e2a5d0b6ebf09b49937d262e8305f
SHA512761a9dc8c954bd7a39aca9eb4d632109d00c030d807ef1d810e664e675d148a2142f50433994a8a9722d922f15434b21d4489321af54c624a25adde29b2b6caf
-
Filesize
7KB
MD5bf4c1230ed70f0156313fddd4ec4439a
SHA18f3b150aa9e0e060c5832c341fded48f44f12d53
SHA256e9a3ca118d36c33c0288d488e2abb0df9bd747558689828ad8edcfc2f9e5982d
SHA512974c0382b052e77618e85beee514e739c766bce90ee19326797f96b9cab03ca08ca611d28dd77272a90abe32edcb6385bcd34f440d6f8fee183d31a14cb11b2d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389