Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
619d561e48610392e3710b9efe88d0aa_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
619d561e48610392e3710b9efe88d0aa_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
619d561e48610392e3710b9efe88d0aa_JaffaCakes118.html
-
Size
175KB
-
MD5
619d561e48610392e3710b9efe88d0aa
-
SHA1
01d69ca7f718cf36f3c316de592d8a9dd0f59742
-
SHA256
259c795fa23bba87e40e32f5ed02bbb999f280f4af60f2dd835d350416616cc2
-
SHA512
e1a9b215feb506bbce33ed5fc72fd030f390689cac38c17d20abb77471e9f8e7f500288e62c8638d22c3da9722bf74898824fa3c68c24333ed772350c5e14609
-
SSDEEP
1536:SqtK8hd8Wu8pI8Cd8hd8dQg0H//3oS3NGNkF3YfBCJisR+aeTH+WK/Lf1/hmnVSV:SpoT3N/FGBCJihm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2404 msedge.exe 2404 msedge.exe 4652 msedge.exe 4652 msedge.exe 3256 identity_helper.exe 3256 identity_helper.exe 5344 msedge.exe 5344 msedge.exe 5344 msedge.exe 5344 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4652 wrote to memory of 372 4652 msedge.exe 83 PID 4652 wrote to memory of 372 4652 msedge.exe 83 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 1056 4652 msedge.exe 86 PID 4652 wrote to memory of 2404 4652 msedge.exe 87 PID 4652 wrote to memory of 2404 4652 msedge.exe 87 PID 4652 wrote to memory of 3332 4652 msedge.exe 88 PID 4652 wrote to memory of 3332 4652 msedge.exe 88 PID 4652 wrote to memory of 3332 4652 msedge.exe 88 PID 4652 wrote to memory of 3332 4652 msedge.exe 88 PID 4652 wrote to memory of 3332 4652 msedge.exe 88 PID 4652 wrote to memory of 3332 4652 msedge.exe 88 PID 4652 wrote to memory of 3332 4652 msedge.exe 88 PID 4652 wrote to memory of 3332 4652 msedge.exe 88 PID 4652 wrote to memory of 3332 4652 msedge.exe 88 PID 4652 wrote to memory of 3332 4652 msedge.exe 88 PID 4652 wrote to memory of 3332 4652 msedge.exe 88 PID 4652 wrote to memory of 3332 4652 msedge.exe 88 PID 4652 wrote to memory of 3332 4652 msedge.exe 88 PID 4652 wrote to memory of 3332 4652 msedge.exe 88 PID 4652 wrote to memory of 3332 4652 msedge.exe 88 PID 4652 wrote to memory of 3332 4652 msedge.exe 88 PID 4652 wrote to memory of 3332 4652 msedge.exe 88 PID 4652 wrote to memory of 3332 4652 msedge.exe 88 PID 4652 wrote to memory of 3332 4652 msedge.exe 88 PID 4652 wrote to memory of 3332 4652 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\619d561e48610392e3710b9efe88d0aa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb649446f8,0x7ffb64944708,0x7ffb649447182⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,12542376258440769094,8747260415330812932,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,12542376258440769094,8747260415330812932,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,12542376258440769094,8747260415330812932,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12542376258440769094,8747260415330812932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12542376258440769094,8747260415330812932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12542376258440769094,8747260415330812932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12542376258440769094,8747260415330812932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12542376258440769094,8747260415330812932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12542376258440769094,8747260415330812932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,12542376258440769094,8747260415330812932,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 /prefetch:82⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,12542376258440769094,8747260415330812932,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12542376258440769094,8747260415330812932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12542376258440769094,8747260415330812932,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12542376258440769094,8747260415330812932,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12542376258440769094,8747260415330812932,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,12542376258440769094,8747260415330812932,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5344
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
46KB
MD5f0d81b309d4441d6dc22bdcb9e9e7d01
SHA177e7510fd01735991f8eb242a8a20acf5c7326d6
SHA25690b890766ed0dfc173b119f625e4bde7785d509a76d27354148bf0a80a09889c
SHA51279d3758017eb11ff478e0c258405aeb66eeef77b6041689708667948c85c1ff27688491eb8fd7efba3e5d392e299c055b3ae54fd212a0f5caaca3d91c425829e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD53aa789980e747a9a69d98c315687078c
SHA17c920684f2bb30c90a70544135a8949c1267cc10
SHA256db18b3acedd76d9a7b9ff8f9935187755c4b3b05a1debd398e05306fa980d803
SHA512b1615d4ee582ffff4f33b77d96e7537e1e20f68607860905a8ce73fae7d08363a5b49d8f4742ba2cfddc62e10206f260e0f64cfaaddcacd8050b3d7301d996da
-
Filesize
2KB
MD5ab93cba20685515e5fc2538544090fe1
SHA13be56e2f541b9a07f9c3b4b9e45ac70104734c01
SHA2565bf938bca0682840578797ae031fe03ff97c8fafab01d7afe139a5867087889a
SHA512e99eb88b5147ed01096175c9b2315b8dc3261251bfa5b258a6533d999973ac560e6215a22e7458ab83db05d3dd17d0d97318cfac549c8e9a6e789c3b34213790
-
Filesize
2KB
MD501e7716b99c978d94de5ddabecba01ec
SHA16d5081535ba4f877b6ea39201dd0c115f7250cea
SHA256e3b5d351cbfb4257c5025104c642816d5b24eb99c6e1866a0eb61eb2e2bd656c
SHA5122920c53ff8661e532ec1d26b3afa77465a480dc49ff19674a02ef84c795a4736679e0c3d9a7122cec3a4f2d8f70eaee0fdc21616d9bbe2484fd69bebf89f6614
-
Filesize
5KB
MD5b0ae1c194c42da28bca3b6b45d5ae897
SHA1515d01b39c36367facc2bd696de6be27ad31d495
SHA256103a58430988f5e5c7d698ac1002839bbe3d4faf1ba7e66419c0e10cffeba0f3
SHA5121d7ae15ff516b9702229c564021cce585d70aa3c63c59f2b2878868ba4bd17e8002181284caf84fc073c47668c0e109b18df325069e32f8596735d84268537b5
-
Filesize
7KB
MD58897133eb34dfa0a69843a9c887da75f
SHA17c80aa507e8373c5d203a8e302100ca63d24d201
SHA256bc7b811608174b9d38f3ac93d2853ac852d62fc73f75792152f3194ae90ce8d7
SHA512c17766706c522de04b0915b83d1cbcf72429e6c355307ba7b565acf217c7a21b3335540342be21ed2caf58e010a2fb840ce67d093f35008447325c551ab6e4ec
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD557819b41123d6c337b6aa7982f1bed0f
SHA1f2738e0dded40d9e46107b812590785ab9688be8
SHA256572085e56cd6130961b9fb2f0a08786ec2b0a91adb6b7fa4e937b4d2f799bd95
SHA5121d60a6933380322347c6c91251d6de95fb035241816ab4b1a0a842f29104bfbd2ab8be3712153bf8c4b59582f64aed258f87a50383cebf0d95386564b86cc507