Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
8f594d2544e912256625bc881d3b30a7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8f594d2544e912256625bc881d3b30a7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8f594d2544e912256625bc881d3b30a7_JaffaCakes118.html
-
Size
53KB
-
MD5
8f594d2544e912256625bc881d3b30a7
-
SHA1
eba795b44fdfd307af9eceda986ce71315d7afbf
-
SHA256
50d8cf03aeacd9b4fe7ba862bca9917c2bba19010b5e5bec2eb68b28ae384288
-
SHA512
6fdd8ab05c1ef612bf07cf6ad42ae20e167810c9dc051ee46ad7d56fa7ab7e648df2b388da5402e9fb028b1114994d0f540838bb5a6f1d0fe2e81d870c1d6ffa
-
SSDEEP
1536:SFqZjAAANVvZFFyBrLFyeTFLy3XFFIGuuvK1di/Hw3kiL53:S8AAAzX9v+di/0kA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5016 msedge.exe 5016 msedge.exe 3188 msedge.exe 3188 msedge.exe 3764 identity_helper.exe 3764 identity_helper.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3188 wrote to memory of 3540 3188 msedge.exe 82 PID 3188 wrote to memory of 3540 3188 msedge.exe 82 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 4404 3188 msedge.exe 83 PID 3188 wrote to memory of 5016 3188 msedge.exe 84 PID 3188 wrote to memory of 5016 3188 msedge.exe 84 PID 3188 wrote to memory of 2936 3188 msedge.exe 85 PID 3188 wrote to memory of 2936 3188 msedge.exe 85 PID 3188 wrote to memory of 2936 3188 msedge.exe 85 PID 3188 wrote to memory of 2936 3188 msedge.exe 85 PID 3188 wrote to memory of 2936 3188 msedge.exe 85 PID 3188 wrote to memory of 2936 3188 msedge.exe 85 PID 3188 wrote to memory of 2936 3188 msedge.exe 85 PID 3188 wrote to memory of 2936 3188 msedge.exe 85 PID 3188 wrote to memory of 2936 3188 msedge.exe 85 PID 3188 wrote to memory of 2936 3188 msedge.exe 85 PID 3188 wrote to memory of 2936 3188 msedge.exe 85 PID 3188 wrote to memory of 2936 3188 msedge.exe 85 PID 3188 wrote to memory of 2936 3188 msedge.exe 85 PID 3188 wrote to memory of 2936 3188 msedge.exe 85 PID 3188 wrote to memory of 2936 3188 msedge.exe 85 PID 3188 wrote to memory of 2936 3188 msedge.exe 85 PID 3188 wrote to memory of 2936 3188 msedge.exe 85 PID 3188 wrote to memory of 2936 3188 msedge.exe 85 PID 3188 wrote to memory of 2936 3188 msedge.exe 85 PID 3188 wrote to memory of 2936 3188 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8f594d2544e912256625bc881d3b30a7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x80,0x108,0x7ff8426246f8,0x7ff842624708,0x7ff8426247182⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,6611518187327240257,14165735309775498014,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,6611518187327240257,14165735309775498014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,6611518187327240257,14165735309775498014,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6611518187327240257,14165735309775498014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6611518187327240257,14165735309775498014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6611518187327240257,14165735309775498014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6611518187327240257,14165735309775498014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6611518187327240257,14165735309775498014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,6611518187327240257,14165735309775498014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6232 /prefetch:82⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,6611518187327240257,14165735309775498014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6611518187327240257,14165735309775498014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6611518187327240257,14165735309775498014,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6611518187327240257,14165735309775498014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6611518187327240257,14165735309775498014,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,6611518187327240257,14165735309775498014,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
23KB
MD5e1c71f7c04be834f5587230db2ad24b3
SHA1f3bab9cb99d9f343bf7ed3981aaa7450515d2424
SHA2569fb6c768068467b58cc773a3907f3f5ec170bfe02ca8f301f6a232a9daf5a899
SHA512205366b4a3ca0dae58722a19ba24088dd8db483db9d14b376434024b064715ade720347ff5de87db014e32d2ef8192e71bbbdd3c885d5a8581b4aafc6e88ce51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5ed47108cbb626c2bf9d04b4fa359c066
SHA18e514590c93ad664ba297ae175fd808d1c5eabb3
SHA2569943cec4a12f2f5af6b3f51205404a472cc84541a8e4fa42d0a4c7c4270f8534
SHA512f9592362ce55ef68fb14825a6f570f2aa7010225ceef062db6768ebca08d6b9fbfc2d856ed34ca2ef47e4f5791734ceeae38fe332ff0dd12ce882ee334f8321e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5d66d4808939a6a8c25b6144fc16ae776
SHA190100a4f7bd598b191a01fc4abc60907f0bfebe9
SHA2563b28d5a1fadc9bbedb368a780df9bab8b3e70234d4a99c5fc08cb9d1395cd7e7
SHA51222da679597827a526e8b688fba9b763fa6919a8fef2b63dcda9593d3c9758b3c0fe69ab165383a806ba86203961311f7ac72771e33c13153f23c0185204116a3
-
Filesize
1KB
MD5b33983fa9c7f3203daaaf4bd68b6a934
SHA15726ef3388a68ff3f95eff2aefacfe5d5a6d829e
SHA256accfcb82b3548db816c0a58a44e6d4a2924eb7221b8eab9f15e4e0c880493544
SHA512a2e0e2a2e4ea143eea6759b0956399153289652fa5f00fdbace13e823f8a6b838322807d988d28c4d74cd2ee5a95b3d21e57d137ec43d91b8b64ab9b215168f7
-
Filesize
5KB
MD5f605dea97596b03684d9fdb1df5920b4
SHA19732154a3e0af9dac1b0668fb9ef7be1bcca9b8c
SHA256890e7125c59d3f199f90be3b6270a15e07b29af1dc4f334014a779600a484f2c
SHA512c59f55d2bfb266c02bce0e21e5dcc65f0d897c64b8cfd8182bcc52f0c6af028b15c496c0f878bd7af36f0c1333ee0d5b7aab50f4edbd96673bc172595efd7390
-
Filesize
6KB
MD564efdf35c84feb9ef72a15d1b80fe04b
SHA1efd1e5a1d64506cb94255f5eb4d8e33bc63a54ed
SHA256bb3620e690e93a730b09113569bd5e5ce377d312633c1afea1184048b1f6fb59
SHA5121f0eb608cf14c9a36754a384f28ae395d16070a6ec4f18d94e5234ffec74d3142e4cf78e301fcc7bc6ef0e8eee411165fb741d5a6aa4e2e374124b4363539883
-
Filesize
7KB
MD56971c3b8e4dbf857e05fe84a3012f28f
SHA1e323b741a517d1e00280a19d33a40265cc024d9b
SHA256a0dfd5611b88de3c5780ccfd7c68f20d43c121a4755951611ac99d11cf680363
SHA51299a1c8422df2fa18a56e115226b588a444ece451872f8b7caa2fd32938b14703f81636ba92e29b7cae0bac0d2601065b36da88a948f8eca777f0a9f0fec363ce
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53c65f2234211ce658824b04860cdbfb8
SHA1a6b4e560af0ae15207b92295f02ce6c13d95d4aa
SHA256efdf9082aa938ab83571225da7d25b6592dce020abb34a17b30018a1fefc959e
SHA51263ca75a4c5c888e8464b8b815a9cfbab97920772084f7857ac2f05ad4fb70b7816cbe32b27d73e0f6aca634bdd7e68fb8489c95142a7888e03b54e184a62da03