Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 14:27
Static task
static1
Behavioral task
behavioral1
Sample
cfbefad702feebeb43bc94dc6d55b4ab_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfbefad702feebeb43bc94dc6d55b4ab_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfbefad702feebeb43bc94dc6d55b4ab_JaffaCakes118.html
-
Size
132KB
-
MD5
cfbefad702feebeb43bc94dc6d55b4ab
-
SHA1
955da24c855e19260d4e95ea3231c5982037a74d
-
SHA256
703cfc3a3e11e52a206b266a0fd142b8109e66069d24bded571e5c73d59d3c3a
-
SHA512
08954dc23781ab151d930cd3017a34ffaa0b8ad1f84c3acd1f54e2e6445abb6c1538dcf326183ec25381d28263f6f59c80ea0f0bdbf13cd2254847036c5f286f
-
SSDEEP
768:1lkDgOriWNcaSoBgG0k/tUnmLXbO3INmOiItHGKwsjmd3O6Uo8Pg0yCx/4Q0Bd4q:PaCk/1bO3IkOiIHqLwHrPtgKi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3484 msedge.exe 3484 msedge.exe 4432 msedge.exe 4432 msedge.exe 3476 identity_helper.exe 3476 identity_helper.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4432 wrote to memory of 2680 4432 msedge.exe 86 PID 4432 wrote to memory of 2680 4432 msedge.exe 86 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 4488 4432 msedge.exe 87 PID 4432 wrote to memory of 3484 4432 msedge.exe 88 PID 4432 wrote to memory of 3484 4432 msedge.exe 88 PID 4432 wrote to memory of 4256 4432 msedge.exe 89 PID 4432 wrote to memory of 4256 4432 msedge.exe 89 PID 4432 wrote to memory of 4256 4432 msedge.exe 89 PID 4432 wrote to memory of 4256 4432 msedge.exe 89 PID 4432 wrote to memory of 4256 4432 msedge.exe 89 PID 4432 wrote to memory of 4256 4432 msedge.exe 89 PID 4432 wrote to memory of 4256 4432 msedge.exe 89 PID 4432 wrote to memory of 4256 4432 msedge.exe 89 PID 4432 wrote to memory of 4256 4432 msedge.exe 89 PID 4432 wrote to memory of 4256 4432 msedge.exe 89 PID 4432 wrote to memory of 4256 4432 msedge.exe 89 PID 4432 wrote to memory of 4256 4432 msedge.exe 89 PID 4432 wrote to memory of 4256 4432 msedge.exe 89 PID 4432 wrote to memory of 4256 4432 msedge.exe 89 PID 4432 wrote to memory of 4256 4432 msedge.exe 89 PID 4432 wrote to memory of 4256 4432 msedge.exe 89 PID 4432 wrote to memory of 4256 4432 msedge.exe 89 PID 4432 wrote to memory of 4256 4432 msedge.exe 89 PID 4432 wrote to memory of 4256 4432 msedge.exe 89 PID 4432 wrote to memory of 4256 4432 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cfbefad702feebeb43bc94dc6d55b4ab_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb979446f8,0x7ffb97944708,0x7ffb979447182⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,7378124438568338035,395746217718619615,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,7378124438568338035,395746217718619615,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,7378124438568338035,395746217718619615,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7378124438568338035,395746217718619615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7378124438568338035,395746217718619615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7378124438568338035,395746217718619615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7378124438568338035,395746217718619615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,7378124438568338035,395746217718619615,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6108 /prefetch:82⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,7378124438568338035,395746217718619615,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7378124438568338035,395746217718619615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7378124438568338035,395746217718619615,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7378124438568338035,395746217718619615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7378124438568338035,395746217718619615,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,7378124438568338035,395746217718619615,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2124
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
23KB
MD5a0423f1305547bb6b8f5a4fb1a9fc2d8
SHA1092dcf1fe57e6bb53821eb754e04188ee70602d5
SHA2566add651cb411ed9ce9a17883c1522920a6ee3b4eb676f5b411e72d1a5e7de6e8
SHA512b8487c60b40d332e562cc5d4fc7c515e3b3c2c82311700b788905754c1376ce6f0da650583545a4691d51f04ec5da0c0204997214d167c85b788d4c85236c4c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD527a50abe279e6c1bc16750b7d48be6e5
SHA1fe843574fffb15089d6e43bac06bf37bce92ce5e
SHA256d63026490ded46bbf7df2243acb5239f931fdd7049d3d25e72371677a8d71b4d
SHA512cf3b1d11b3050ef8c30ff9560d03917638ed13c09fbb50e902b2f5dc71aa59b23b9e49c643dc3540f141b2b06ee4c8459152e10e2221af29fd2ef745f26a442f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD539c3f4f2e5f13da1db91b7e59e031c3a
SHA1ccf596ac00082e155d28ceffe1d9893d303ecd48
SHA256a8f3b65e250301b8f8d2c5b2c224aa05c8fc93744acee3f5baf248a55f0831a2
SHA512ea10b7f5c4b0763b349f4e71696ffe3cc074cebe447912ea368c17c17cf65fae75493df159968f729f80c04565413fc23b4f6be1db444d0371c0cd27da934b5f
-
Filesize
1KB
MD5714a6912871ad0b438154756074d4782
SHA16a045effcdb9897dd8cd54a7249070315501ab7b
SHA256b082697ec74203d7b675b343a573197edca7aab89a8deccf461f5e1ebe118375
SHA512aa27912dcd0d0bc59193dac5f6407ebc3e8a9fb494fe3719092c6a70cdb401e3ab1d2625df55066b03b35b833600e0eb72c92ebe19b5fc09c8300f198ced9183
-
Filesize
7KB
MD5ab8738a3cad1bccbee4d6d659cbd6ab9
SHA1d40b9ce94d426ded4cf3449d563f8d00467586eb
SHA256c7bc688f0b9298c7dbe240c7800ee35da19e21ba235529e27b8d9f96cb3e5864
SHA5125ec5d05efecb50f1e04ce0aca97d08c57dd4f985776ee96054733717b9f7efbfbb3a0ccda8b846963e01a481a0b9d22f145c821204860cbebd947d24a0af7689
-
Filesize
7KB
MD5b0dc9dc568042accb0776b44886a6fbf
SHA1fa165a065902935def68a6d0bd34e27f1d1b881b
SHA256c4072943b3bd7a2c30f16c88fef94914d82193b99f875134c28c4df0da8c96d3
SHA512660bdc2626af0a0dc6eabc75c1a593f30aa4f0af4843a51c7ae458f5f54be238b6092b1f95b01fa738b8e2233fbf6b107706f0ff2194e82f1a097a29548b0d70
-
Filesize
6KB
MD56963aa6e83104925fdcd7a7a468cd81c
SHA1ded789cf1fe4f71df35375185b104c1c3c6e3e31
SHA2566fe55d24142ec9adf669a07978a69f3c660ca7c2bf2b437acab351f873ceb25d
SHA512a82194d724d84ceef862d257fb23fb4bcb22f2b863eaf7eb84a40ab9c55e964e6819c7972ca1cca50dc50a7fa5eae99ec00a1e039d2beae6c576113b556a2556
-
Filesize
6KB
MD5e1a4e8400b2b3156ddbe29b690566854
SHA11426628c7728d3e3a12395d6f8b5fc69e2cbaee4
SHA256e52865672c81b07a08c99b8348d5d36f46f230694966082cf0a375f3fbb48abc
SHA51215e308f1c9d3fb6ace01a4eb3fdea9912ef5e6b0f4bdc67a730d5442283b27972fcf02b9f118f044c0daf0d80bcab5109f760b03d3a8887441fe9d3e019fa809
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5982a9d632583a859105695ba740866b4
SHA18267c1d5aacc7b5909ba84700592023bb02ede89
SHA256b1d9473d44a9ea15aa3c3f8668d14dfd42af00a6930dcbfddd39e4f049f7b581
SHA512ad8a56600a7c0009ca3c527ec45b65c9c0573a7e6df7a06df6665a486879b5a81a7ba5552264e18162058b42342a5df6beef7bcaa890e3f90772dd834192f91a