Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
08878ebd8eceecb8acc3f4c259589d48_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
08878ebd8eceecb8acc3f4c259589d48_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
08878ebd8eceecb8acc3f4c259589d48_JaffaCakes118.html
-
Size
1.0MB
-
MD5
08878ebd8eceecb8acc3f4c259589d48
-
SHA1
72f1ffd94b2c4d1c883846913aa7899febcffcff
-
SHA256
d6b89f15ba7d0e93bca65d4e3fb3cc75d509892e6890bf207700d366bdd78473
-
SHA512
48989fc39e2cd151e8ba9cbcedeba2d672e5db4e58bf9d2f1c6b707f4c03f4b9a76ae25a4584f394d44b5424ae41a4612723b32ceb6e757c6db6dc2acb54128c
-
SSDEEP
6144:5kclD34UQ6Y/JBDRl3LHhFKB/SKbO6/lsE2HG1qxt+GPaqFZV+rW1bWe:5kclcB66BDRl3LqBZ7xq/1D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2984 msedge.exe 2984 msedge.exe 3224 msedge.exe 3224 msedge.exe 648 identity_helper.exe 648 identity_helper.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3224 wrote to memory of 2112 3224 msedge.exe 84 PID 3224 wrote to memory of 2112 3224 msedge.exe 84 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 760 3224 msedge.exe 85 PID 3224 wrote to memory of 2984 3224 msedge.exe 86 PID 3224 wrote to memory of 2984 3224 msedge.exe 86 PID 3224 wrote to memory of 2528 3224 msedge.exe 87 PID 3224 wrote to memory of 2528 3224 msedge.exe 87 PID 3224 wrote to memory of 2528 3224 msedge.exe 87 PID 3224 wrote to memory of 2528 3224 msedge.exe 87 PID 3224 wrote to memory of 2528 3224 msedge.exe 87 PID 3224 wrote to memory of 2528 3224 msedge.exe 87 PID 3224 wrote to memory of 2528 3224 msedge.exe 87 PID 3224 wrote to memory of 2528 3224 msedge.exe 87 PID 3224 wrote to memory of 2528 3224 msedge.exe 87 PID 3224 wrote to memory of 2528 3224 msedge.exe 87 PID 3224 wrote to memory of 2528 3224 msedge.exe 87 PID 3224 wrote to memory of 2528 3224 msedge.exe 87 PID 3224 wrote to memory of 2528 3224 msedge.exe 87 PID 3224 wrote to memory of 2528 3224 msedge.exe 87 PID 3224 wrote to memory of 2528 3224 msedge.exe 87 PID 3224 wrote to memory of 2528 3224 msedge.exe 87 PID 3224 wrote to memory of 2528 3224 msedge.exe 87 PID 3224 wrote to memory of 2528 3224 msedge.exe 87 PID 3224 wrote to memory of 2528 3224 msedge.exe 87 PID 3224 wrote to memory of 2528 3224 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\08878ebd8eceecb8acc3f4c259589d48_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb40d46f8,0x7ffcb40d4708,0x7ffcb40d47182⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16718101681558869222,7694622686443684426,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2316 /prefetch:22⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,16718101681558869222,7694622686443684426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,16718101681558869222,7694622686443684426,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16718101681558869222,7694622686443684426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16718101681558869222,7694622686443684426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16718101681558869222,7694622686443684426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16718101681558869222,7694622686443684426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16718101681558869222,7694622686443684426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16718101681558869222,7694622686443684426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16718101681558869222,7694622686443684426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16718101681558869222,7694622686443684426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,16718101681558869222,7694622686443684426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3296 /prefetch:82⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,16718101681558869222,7694622686443684426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16718101681558869222,7694622686443684426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16718101681558869222,7694622686443684426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16718101681558869222,7694622686443684426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16718101681558869222,7694622686443684426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16718101681558869222,7694622686443684426,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1296 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD58874c3d81659526adf05f2dc0b15c67d
SHA11e725f62554b14e5a6f2ab8072207ff8e68e5ae7
SHA256c8193af941c88c127aefb860c8c00af2cbb9750a14c5f6a9a825ade8d23fb89e
SHA512308a13458c9b9c2ebee043767f906f29f519051a528956c049da4027d451c0176f82c6e2b2449889f7b8b262257103d794f2fd9b4c6db4ae3933f2033aae9b3e
-
Filesize
2KB
MD5ed10167cec104170e701133dbf586af4
SHA1b3636d5b12b59cdb8604ffa4222b0f4381c7012c
SHA256d681d49fc1ab98e38933c91002da447befcc032b3bbf92a178a9e33648699f54
SHA512d2994034e205d450c4de53a3d20176b5b84d2d10cfcd341c4e05062f593b8f3f652e62c1ebe829b17786b7ac33c826c49214e78c932736422ca5dc9d1405f175
-
Filesize
6KB
MD54b843a072c3b67d0d56fc0749ff6f362
SHA17601e5217342db36dd05cde0c153707275be25bb
SHA256a054924b04d57e5583d33ce01098ae39e3355adce34c7a2d1da3988ae01583cf
SHA512602aae1c16036a0ffa4f0492f02f6d38d4b63387471b2070eab35843af0ba7c2447330d870d3f2809f5bcd1fed2c297d0f9603ba003275710b751ac3ffffe67f
-
Filesize
7KB
MD5eedc456415fd2a0c7cdd0ab33f9cbc29
SHA17868a6debcfac74a238897b1fbc4769d22a6b1d9
SHA2569553036dc8d5dcbe552b1d9d8c712967c19563c3077c601404bed7717b2a3769
SHA512e0c45a66df13ffbff539d0fe54be96b7c097770a02a101233deb4676d9f5bfe1249b2d04c4b7f4d06cd45b3cca6969220cdbc0e013821da413ac13045e354316
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50c9fc902296bddc439b13a331850f7b7
SHA1ab0809e0cc9534306353dafd05e1b35bcabe141c
SHA256577cdedc97dab9312ab86b43629ca53cc8ffb383676e3e7e370c12596dbaa0bd
SHA512201e44bc7ee1313f5a498f83efb557b7f422d1ef985d088007523a4bb58a73ba176b9ec515624571f1e03068e66a5503cb51684bec317e728f7ec481de30a9c9