Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 23:20
Static task
static1
Behavioral task
behavioral1
Sample
80914acf2bfc7d1e1aad515990c884e1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
80914acf2bfc7d1e1aad515990c884e1_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
80914acf2bfc7d1e1aad515990c884e1_JaffaCakes118.html
-
Size
48KB
-
MD5
80914acf2bfc7d1e1aad515990c884e1
-
SHA1
0095c22f9748d3fed45e27893c1c3ffa83c782d7
-
SHA256
7bbd82f42b9766a94d170995a33f41bc7f9decb2036bc2bbfe56ba7eca04603a
-
SHA512
025f2a8135a312fec69251faa06226a2f5d37f89e218a0da463b6dca43a66adda0e86e276b143e92fef1ba5da9bca21105531b7ea55d2710d20911e467e124a9
-
SSDEEP
1536:ptUtUKuIMkUn2WwUAUUU0UY2B+UuUuUDUFU8QU5UU2UQU2UzU2UwUFUOU+UnUDU5:PUtUKuIpU21UAUUU0UY2B+UuUuUDUFUo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 1008 msedge.exe 1008 msedge.exe 3100 identity_helper.exe 3100 identity_helper.exe 5656 msedge.exe 5656 msedge.exe 5656 msedge.exe 5656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1008 wrote to memory of 2728 1008 msedge.exe 84 PID 1008 wrote to memory of 2728 1008 msedge.exe 84 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 3300 1008 msedge.exe 85 PID 1008 wrote to memory of 1100 1008 msedge.exe 86 PID 1008 wrote to memory of 1100 1008 msedge.exe 86 PID 1008 wrote to memory of 2720 1008 msedge.exe 87 PID 1008 wrote to memory of 2720 1008 msedge.exe 87 PID 1008 wrote to memory of 2720 1008 msedge.exe 87 PID 1008 wrote to memory of 2720 1008 msedge.exe 87 PID 1008 wrote to memory of 2720 1008 msedge.exe 87 PID 1008 wrote to memory of 2720 1008 msedge.exe 87 PID 1008 wrote to memory of 2720 1008 msedge.exe 87 PID 1008 wrote to memory of 2720 1008 msedge.exe 87 PID 1008 wrote to memory of 2720 1008 msedge.exe 87 PID 1008 wrote to memory of 2720 1008 msedge.exe 87 PID 1008 wrote to memory of 2720 1008 msedge.exe 87 PID 1008 wrote to memory of 2720 1008 msedge.exe 87 PID 1008 wrote to memory of 2720 1008 msedge.exe 87 PID 1008 wrote to memory of 2720 1008 msedge.exe 87 PID 1008 wrote to memory of 2720 1008 msedge.exe 87 PID 1008 wrote to memory of 2720 1008 msedge.exe 87 PID 1008 wrote to memory of 2720 1008 msedge.exe 87 PID 1008 wrote to memory of 2720 1008 msedge.exe 87 PID 1008 wrote to memory of 2720 1008 msedge.exe 87 PID 1008 wrote to memory of 2720 1008 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\80914acf2bfc7d1e1aad515990c884e1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82df446f8,0x7ff82df44708,0x7ff82df447182⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,9130036715874807904,8020926786957448927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,9130036715874807904,8020926786957448927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,9130036715874807904,8020926786957448927,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9130036715874807904,8020926786957448927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9130036715874807904,8020926786957448927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9130036715874807904,8020926786957448927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9130036715874807904,8020926786957448927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4276 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9130036715874807904,8020926786957448927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9130036715874807904,8020926786957448927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,9130036715874807904,8020926786957448927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6036 /prefetch:82⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,9130036715874807904,8020926786957448927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9130036715874807904,8020926786957448927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9130036715874807904,8020926786957448927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9130036715874807904,8020926786957448927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:5204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9130036715874807904,8020926786957448927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6252 /prefetch:12⤵PID:5212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9130036715874807904,8020926786957448927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,9130036715874807904,8020926786957448927,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5107e7a9cbd2292c5e748154ab756ed52
SHA10a5073432b7cad070b8c884ee71b0e268339d057
SHA2562adbf2b06d5b2fe98ab3a3a45c75b846f85a69c54bba9c67d8ccf2ce39bff42f
SHA5127ecd37837ca4dc55550923ac195798a1b2486fda198b026919765d6afddda170275c6e151e734615864598f9934247d3ad8e91ed39e62db5d9ca05b73d7133e2
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD544a62c7ecc5d05b4577e52b9131e83f9
SHA1620c52825e4a3bae02988813a557fffb3b9bdcac
SHA2566984eb95e6087759125e37c93901b69e70170b62b185824d4f8d13e91f5159fd
SHA51224464db9113c27d04541a641f3ce5ebf1e39a46b8ec5c24393b366e67fae65a5d048edb262b963cbb3e5e050f5a8fac6bdb088f1161edae8322985c059611b07
-
Filesize
1KB
MD5a54029eaab80b5e067c4adf9f9644cef
SHA1ac9e41411abdc9f2f6ae6fd2aadb4b4ff5e23f67
SHA256da75b604836767475dd84922131e4a9a30cde4c6007bfc56ceea7583a9e36f7b
SHA5129b463cef743f4a992e9fbcb43dd29c44d5adb731935a5828d04dded6311c1f3f11dbec3970000c154ec1be7566f3a4a96f9e036af12483a7d5bc6ccfc039d70e
-
Filesize
5KB
MD563bae4c9115e99ec015fc640d61349a0
SHA169ef4e7526328148ab75d16d91536091a5508545
SHA25648f8eee0fd478d1f2940266f9fa80abbc04169212ed46f1ddab25431b5d26d8b
SHA512b10fdf2a6f60f7c11e35d2ba0950ffab35073bdbce21a65385cc6c04e52a2bb572e14bf945c9d95a15f8503c4d608c44560d5425a3e28552b9a6ea9a5d11eda0
-
Filesize
7KB
MD5db400279afea8ab56e6128543d5c8ddf
SHA1398264a2cd81537f497d23511a2717ed2213b858
SHA25616684198fa1ec608fc91c5ddcf0541ede3ec7fa45a06442912de71f0ab755d2f
SHA5128b3841d6de3486e03d4094d3100464b3b7da222f70644b487743b546a1a6584ede76a72737297c9bbc4b01caaeaed4bbe8d7b28882ec71c5782cee8158fb996f
-
Filesize
7KB
MD5c1eabe3677631884af8671a877dc26f0
SHA15ed7f24c981a87af1cbcae1f004467622b33e272
SHA256783440372e1cdff36ed8d41b028353074417878676ad6c02fa49fc553b0a38ca
SHA5127297b4668a68de4021daec9691fbf5016f0c5e0cdfe37490f06b3d71db09e48980348a98a7354c8d18202dfa4be4e4c5a6e16be6f9ff9909ef82de2d9d7acc03
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389