Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 06:21
Static task
static1
Behavioral task
behavioral1
Sample
28b0955aff6fff7f558e25531410b029_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
28b0955aff6fff7f558e25531410b029_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
28b0955aff6fff7f558e25531410b029_JaffaCakes118.html
-
Size
42KB
-
MD5
28b0955aff6fff7f558e25531410b029
-
SHA1
fb2f133449bf9409e4e0ffc4930a01e7c964c74b
-
SHA256
573462c59991626feea0dbb04d4532cf1c70e1ac6050bca2472ed611a50a206e
-
SHA512
8bee5d22e35f1ac1abcfb0724e02437846740228c96837818e0376b13e776544f5314ead73c4b6c26969ae3718b2079bc37be15f9898226c65ecd3668f367075
-
SSDEEP
768:OayHHvPWloFJPnob+zg3fK4f1Yo6wTu2SVyr:O3HH2lSJPFzgis6wT1r
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4204 msedge.exe 4204 msedge.exe 4364 msedge.exe 4364 msedge.exe 5284 identity_helper.exe 5284 identity_helper.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4364 wrote to memory of 3800 4364 msedge.exe 81 PID 4364 wrote to memory of 3800 4364 msedge.exe 81 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4812 4364 msedge.exe 82 PID 4364 wrote to memory of 4204 4364 msedge.exe 83 PID 4364 wrote to memory of 4204 4364 msedge.exe 83 PID 4364 wrote to memory of 4800 4364 msedge.exe 84 PID 4364 wrote to memory of 4800 4364 msedge.exe 84 PID 4364 wrote to memory of 4800 4364 msedge.exe 84 PID 4364 wrote to memory of 4800 4364 msedge.exe 84 PID 4364 wrote to memory of 4800 4364 msedge.exe 84 PID 4364 wrote to memory of 4800 4364 msedge.exe 84 PID 4364 wrote to memory of 4800 4364 msedge.exe 84 PID 4364 wrote to memory of 4800 4364 msedge.exe 84 PID 4364 wrote to memory of 4800 4364 msedge.exe 84 PID 4364 wrote to memory of 4800 4364 msedge.exe 84 PID 4364 wrote to memory of 4800 4364 msedge.exe 84 PID 4364 wrote to memory of 4800 4364 msedge.exe 84 PID 4364 wrote to memory of 4800 4364 msedge.exe 84 PID 4364 wrote to memory of 4800 4364 msedge.exe 84 PID 4364 wrote to memory of 4800 4364 msedge.exe 84 PID 4364 wrote to memory of 4800 4364 msedge.exe 84 PID 4364 wrote to memory of 4800 4364 msedge.exe 84 PID 4364 wrote to memory of 4800 4364 msedge.exe 84 PID 4364 wrote to memory of 4800 4364 msedge.exe 84 PID 4364 wrote to memory of 4800 4364 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\28b0955aff6fff7f558e25531410b029_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa12ce46f8,0x7ffa12ce4708,0x7ffa12ce47182⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5736283796014680081,1713392401865221829,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,5736283796014680081,1713392401865221829,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,5736283796014680081,1713392401865221829,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2440 /prefetch:82⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5736283796014680081,1713392401865221829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:5324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5736283796014680081,1713392401865221829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5736283796014680081,1713392401865221829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5736283796014680081,1713392401865221829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5736283796014680081,1713392401865221829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5736283796014680081,1713392401865221829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6452 /prefetch:12⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5736283796014680081,1713392401865221829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5736283796014680081,1713392401865221829,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7052 /prefetch:82⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5736283796014680081,1713392401865221829,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7052 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5736283796014680081,1713392401865221829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7060 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5736283796014680081,1713392401865221829,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:6088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5736283796014680081,1713392401865221829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5736283796014680081,1713392401865221829,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6172 /prefetch:12⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5736283796014680081,1713392401865221829,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2552
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\60a5419f-b8c9-4e72-bb73-5fb7cd8edb23.tmp
Filesize7KB
MD5d8b58816c365bb7fa7aa046b4369b27b
SHA12e88670fd20e787970070d9495b65edbaf12cc1d
SHA25620749e9bdf6dc990f1aba17e9b73e6896e2fe929e433f95f317735279d7b490d
SHA51220860c26c2f847f67b7f25e4314e54b831b374311393e28777fad927917d174f4ac2176cba0b711312b61fd9f9e67d0df8fefbb45aec5a243e730ae29745ee11
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD54b1078627837e6cb5e81f36acdce9e07
SHA12b9f21154bb939ed357bc6373174351b671b5a71
SHA256b513fcfe18bf8fdc672ae349f4399e8b6ade67917590c420046a17471da76535
SHA512ab245d8e839c29eb6e25e33b09bab5a7b418ab77c724d287119eebf961e8e496c183c427651373b8a2c48bbb259b24956e4f1dddbbd2fb670974df5928a5eeeb
-
Filesize
2KB
MD5274b45eb2c68d10c69ddc26812cafbea
SHA14eaef76a169cac53cd8aa2de3136b5d730974a20
SHA2567db266eeffef79eca46a96c5f50b3d531cdc8afccca2980b6972986ace49542b
SHA512186f22689a5b921bfbc2e028fe6ee2e7befb646c79c0417a5803a58b0c154eb684c7511797d96b6cdb704c405077b9d6dda7072664cfca9ccd2149782b7a9f40
-
Filesize
6KB
MD5b1acdeb4977274eae2f1ac4794452480
SHA180e826e692d45d7b7d19c1abb8c0b234d6b5e368
SHA256a24b23a23c59f88a3be0582b485e124df4faafc497c7d0b76508a2d03731189f
SHA512fdc42c919bc59ab954b87e5a1651e4e00a2386ffa2485c0026ee5fa678adb9597d3eef03ab7b78e5ee03dfa19f656bbb98bc73b5e5c8eb85133b68c52f930e34
-
Filesize
7KB
MD5ef2556a8e8672774702db69d5121e6a1
SHA106f4cf74797f741f436da3400d684a9a65e98ca8
SHA256b1f75ef85aed30e452fc5bb78730ec76b76be979de5457780741b91a0cdc90f1
SHA5129eeec238099a8bc1a6ab7270ed07edbfb81b9941dab94aa91f5ca54822a332ba20a9461dc15f05903c57bde289a3fade4f4a13fcea22f06052a8246167060397
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57d6532f10dcd7a8c2937a8b2086c4b97
SHA11c8e7004e4f124d8b9c0da20292bbb84beb29785
SHA2563ea6a9b3dd092b98ad827167fc9d6a02d9156768cc917ae64ff457269c586c48
SHA512a3732d7fadf948b434ada66c1b965736de5c9a6f836084a0f27a8431cdad2a22c09965184f27c99ccf86f9dc11e24ffd82f1b6407808fc003b322bdc25c0f36f