Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
73f44d8ec2957952e9107f8ae98d4557_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
73f44d8ec2957952e9107f8ae98d4557_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
73f44d8ec2957952e9107f8ae98d4557_JaffaCakes118.html
-
Size
452KB
-
MD5
73f44d8ec2957952e9107f8ae98d4557
-
SHA1
76090e1053d19dfb1bdf0713d2225de7baaa78bc
-
SHA256
b26303f201099f12ef4318c0f0e4e8ce8874341ee83ab99963657c5d15dbdd5e
-
SHA512
7c25fcc55c59d13357e9c521a3ae38436d468b9b8cd80c7f689a1c8d6e2e2d0286d69f2a86882cbaf2f94e04fb9d00f24c313e094ee80f92235eb3e259c2ff4c
-
SSDEEP
12288:RFEifJB2tpeTWk888N7y+XUfoZnPeXu1tfKm1hdRMKMJ0V0F0sUQz:zfJ3KMJ0V0FZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 1604 msedge.exe 1604 msedge.exe 2012 identity_helper.exe 2012 identity_helper.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1604 wrote to memory of 228 1604 msedge.exe 82 PID 1604 wrote to memory of 228 1604 msedge.exe 82 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 2512 1604 msedge.exe 83 PID 1604 wrote to memory of 4672 1604 msedge.exe 84 PID 1604 wrote to memory of 4672 1604 msedge.exe 84 PID 1604 wrote to memory of 4384 1604 msedge.exe 85 PID 1604 wrote to memory of 4384 1604 msedge.exe 85 PID 1604 wrote to memory of 4384 1604 msedge.exe 85 PID 1604 wrote to memory of 4384 1604 msedge.exe 85 PID 1604 wrote to memory of 4384 1604 msedge.exe 85 PID 1604 wrote to memory of 4384 1604 msedge.exe 85 PID 1604 wrote to memory of 4384 1604 msedge.exe 85 PID 1604 wrote to memory of 4384 1604 msedge.exe 85 PID 1604 wrote to memory of 4384 1604 msedge.exe 85 PID 1604 wrote to memory of 4384 1604 msedge.exe 85 PID 1604 wrote to memory of 4384 1604 msedge.exe 85 PID 1604 wrote to memory of 4384 1604 msedge.exe 85 PID 1604 wrote to memory of 4384 1604 msedge.exe 85 PID 1604 wrote to memory of 4384 1604 msedge.exe 85 PID 1604 wrote to memory of 4384 1604 msedge.exe 85 PID 1604 wrote to memory of 4384 1604 msedge.exe 85 PID 1604 wrote to memory of 4384 1604 msedge.exe 85 PID 1604 wrote to memory of 4384 1604 msedge.exe 85 PID 1604 wrote to memory of 4384 1604 msedge.exe 85 PID 1604 wrote to memory of 4384 1604 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\73f44d8ec2957952e9107f8ae98d4557_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f8da46f8,0x7ff8f8da4708,0x7ff8f8da47182⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,2706113840096326147,17734500578528105460,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,2706113840096326147,17734500578528105460,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,2706113840096326147,17734500578528105460,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,2706113840096326147,17734500578528105460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,2706113840096326147,17734500578528105460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,2706113840096326147,17734500578528105460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3048 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,2706113840096326147,17734500578528105460,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,2706113840096326147,17734500578528105460,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,2706113840096326147,17734500578528105460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,2706113840096326147,17734500578528105460,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:12⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,2706113840096326147,17734500578528105460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,2706113840096326147,17734500578528105460,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2180 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,2706113840096326147,17734500578528105460,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3444
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5dc33c8982b66472674bfda65f67fc0d4
SHA161bab1f287d270dabf182f324ecd77960ac58b8f
SHA256880acaac2dbf1c464d781edb125596e129ec767dfbce99724ab23ca53ee88d62
SHA5120b9385a7ea0b85addfe924314dab049ae138953f6a92afc881d5bb801dd9ce6c628acfa18316da9da9f4e2fb08aed8cecd2428a7920ce53199bce0af3311df59
-
Filesize
1KB
MD5a51c7c7c41aea328842b744b73ed11e1
SHA11f0dc2160ab9ff89a035f3e11bc07bf0e64de2be
SHA2564562addd14c95d89d1b8919baefbd63c603fb70e94efdcc9b55318c70542ad7e
SHA5120e8821a8e93273b05d03c413e788f0f7208def3b7c7b879cba3f1aa473d2f8ea2e4d4686169691d5c87672cbff548e88df1331540d83fb8cf0a9c9340042c84d
-
Filesize
1KB
MD51c14aaa60cb1a59504a7f5e1c74ec5f7
SHA1e93e679ade20211aab479bcebbcb039c952a7c42
SHA2569ffaa5433753071b4a30311473bb09b35a6a08fd45351e12a2fd0deb8d629555
SHA512049db960bb60259182a67e98868e66b13289a65fa9f54c63b927677b88aa700bad8aca595959f198e4d7299bafa6fe8453cc6fd9669339cbb01cf27041bc2c6d
-
Filesize
5KB
MD55fa2b86815e10cad2368575555cb0c50
SHA10e0fccf5c5aa841f5574109fa38eeeecd76509c2
SHA25692be2c62ddccf10daa6934e034e6efec40f7ddbeb89907f8ac9148b2815a2d2c
SHA512cd4afd21a606fed8dce60c48539c681ed20323a5c41ea9bed5b487c663626757b31cd20b9367393ba34bd1f3c67abc5fde42476d588570321a8fe9aba117b105
-
Filesize
6KB
MD54c0a6973b856de910b472f5944d7ffa0
SHA1640b5e15901a9671ede10d480b42ab445f246c04
SHA2560db11dba473919fa13bd7526730a4c0c6dcb3ebc40403fd71f639cab483455ae
SHA51261c250043da189d0efe98ed357cc5a197ba8de36228788c79beb54565a0d020a81990c4d33738bb525cd4bce9e4de06cab043b6596c6132c3167531558db0b9a
-
Filesize
6KB
MD5990774ca2f664f33cae8c1a94f690517
SHA18a3e5aea402857473489d44b384639475487f8c7
SHA256f30be0e6ac3595c0bcf60770d9e47cebd9a67b04ef9fdb54723fd44dac558820
SHA5126d2520289da4a983300378ee70049fadc10909c189734fdece30c6f66c861926482a1e41e8cdbd3354439a24203d1d80040ce39e2fcb4eef10acf0c4eaac8192
-
Filesize
706B
MD5b64f616ca94dbcce36a9957d526aea04
SHA126ab60d4dfa278640264b583a3faa2910686b217
SHA256b3f03f6d35cefb796c5b7edc9e054b53801e5ab6cd708a02b1e729ef1f071aaa
SHA512e47befe1ff0d3730aaff9325e59200b2841661e79f39fe2025f3254c5d952494da81fcda9a52b5be85dca2109fa2295312a19f4d0409a75d3cb99cde48cb9a5f
-
Filesize
539B
MD557d47c2d1656d76b7f3082006edd7e2d
SHA19ebfdbda528e38aabfe39d58b15fd6afe1455466
SHA256b2b27a8ece6f65b72bd66ce471a6b157af425147b1f3625458026c0f62412349
SHA512fc181338d30d6ee7da0b88caee6685da2aabdaa14dcc0147cdfc07f1be6ea8da0d7702fc0c7c8ffb69038e865d57c68884139947db844a75e0e37c59c009070b
-
Filesize
539B
MD516fdeaedd6da59d8fc9bf1c5927b311b
SHA17fba63e731b1c8253fe17b5b0cb6a00e0a867219
SHA256627543ff1bd46b56d7444bf1932c0318b7768913f9453334ee89e3fbf66666c7
SHA512c6648d8d02c76824b32462ace6959c1a27553ff10eb76f4b8400dad876c8f254699866aa0e5c123500f2573fe075930632cbd1c69fd0cf51bdc0d84bd3c4e18d
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD541298c19e840a0f51c4f4406548c37a6
SHA1801fb32c526802268b764d4994b50b4bedeb8e6b
SHA256d88b460345dc2377f5c35db1ad881e656386554b3e6ef3534b8740a450ea5d2e
SHA512e2d3e7137317a126b34b1b14efe1cf1cafcf4decdc98830962814d08ad49af6b2619cf053fed06a1108b9b2ca3c157d97b046897bff92d14a07b5ecdb86156d6