Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 15:18
Static task
static1
Behavioral task
behavioral1
Sample
c10436bc98fca507da2a6194e11c8612_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c10436bc98fca507da2a6194e11c8612_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c10436bc98fca507da2a6194e11c8612_JaffaCakes118.html
-
Size
112KB
-
MD5
c10436bc98fca507da2a6194e11c8612
-
SHA1
2cad74aa78fe56435a231d84311434df44f2ee82
-
SHA256
18b3ee9cd5500723f06645b5957fa4b71e3f5f9e5bc6fa01ee95ef8abf173908
-
SHA512
5e9b48d07114b7a4a90c8696b232fe491749f7d6b327d0dc0f2622caa2575797bf45c2ea276455fc22f18c2117f68bff664dc7c273e7618507a8dcf4ba8a32fd
-
SSDEEP
1536:ARYCWsKSNF9NU68kgg58sDWOlxIwWA9dnUqAwU6COn8PHGTUKdzU36:SYCz1NU6nguD9lxI9XBvW8PHGTUKdc6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 3592 msedge.exe 3592 msedge.exe 3556 identity_helper.exe 3556 identity_helper.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3592 wrote to memory of 2224 3592 msedge.exe 86 PID 3592 wrote to memory of 2224 3592 msedge.exe 86 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 1868 3592 msedge.exe 87 PID 3592 wrote to memory of 3148 3592 msedge.exe 88 PID 3592 wrote to memory of 3148 3592 msedge.exe 88 PID 3592 wrote to memory of 3196 3592 msedge.exe 89 PID 3592 wrote to memory of 3196 3592 msedge.exe 89 PID 3592 wrote to memory of 3196 3592 msedge.exe 89 PID 3592 wrote to memory of 3196 3592 msedge.exe 89 PID 3592 wrote to memory of 3196 3592 msedge.exe 89 PID 3592 wrote to memory of 3196 3592 msedge.exe 89 PID 3592 wrote to memory of 3196 3592 msedge.exe 89 PID 3592 wrote to memory of 3196 3592 msedge.exe 89 PID 3592 wrote to memory of 3196 3592 msedge.exe 89 PID 3592 wrote to memory of 3196 3592 msedge.exe 89 PID 3592 wrote to memory of 3196 3592 msedge.exe 89 PID 3592 wrote to memory of 3196 3592 msedge.exe 89 PID 3592 wrote to memory of 3196 3592 msedge.exe 89 PID 3592 wrote to memory of 3196 3592 msedge.exe 89 PID 3592 wrote to memory of 3196 3592 msedge.exe 89 PID 3592 wrote to memory of 3196 3592 msedge.exe 89 PID 3592 wrote to memory of 3196 3592 msedge.exe 89 PID 3592 wrote to memory of 3196 3592 msedge.exe 89 PID 3592 wrote to memory of 3196 3592 msedge.exe 89 PID 3592 wrote to memory of 3196 3592 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c10436bc98fca507da2a6194e11c8612_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd3eb46f8,0x7ffcd3eb4708,0x7ffcd3eb47182⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,9069199903201994060,14007139097572174690,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,9069199903201994060,14007139097572174690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,9069199903201994060,14007139097572174690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9069199903201994060,14007139097572174690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9069199903201994060,14007139097572174690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9069199903201994060,14007139097572174690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9069199903201994060,14007139097572174690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,9069199903201994060,14007139097572174690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:82⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,9069199903201994060,14007139097572174690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9069199903201994060,14007139097572174690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9069199903201994060,14007139097572174690,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9069199903201994060,14007139097572174690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9069199903201994060,14007139097572174690,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,9069199903201994060,14007139097572174690,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5440 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
23KB
MD5a0423f1305547bb6b8f5a4fb1a9fc2d8
SHA1092dcf1fe57e6bb53821eb754e04188ee70602d5
SHA2566add651cb411ed9ce9a17883c1522920a6ee3b4eb676f5b411e72d1a5e7de6e8
SHA512b8487c60b40d332e562cc5d4fc7c515e3b3c2c82311700b788905754c1376ce6f0da650583545a4691d51f04ec5da0c0204997214d167c85b788d4c85236c4c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5799ff3cbf30ab10e37e5a8eb9d78996c
SHA1b3764e3d31c57328efad30507b8b3f48848cd8ae
SHA256791caddf08cf940f61b4fb94730f41bc649540d2d27fa8927bcd95770499f0b8
SHA512652304e838a2403fdd7b8b24d006fb068734be923285881671100651a9d1cba293655b81f1b5648b58480320e40b781c0d3563920474b1d147ee663907c95b1c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5c5369e12d798f5236e0a560a2a24da93
SHA10fe14df8cffaf62a064ca0375bdc94b80f402177
SHA256a339eae75f5ddbc9fcaf1c05d00d53eca7aba1488c0ea3e89e49428ba9bf74dc
SHA51256a2113d19820f0c24a9583f31e41ca7faf02996e12b55d13b83fa8b870a8da8f10dc078f756b22931483f8e750ca52d1d55da5962b24dd98514fbbb44b657b2
-
Filesize
1KB
MD5ce5635d3bfca88a14c743f2761f981a3
SHA19db59229738ea4255b469b618817ab35d3a16956
SHA25674a51a8e11e7081f2a5889493455b456cce72dcb5c77e2bb7e7c20111da535a0
SHA5125443aa691f145f4e4e363d616d59e4d733f25db2f3e2fa16e6be6dd1dc93f46b53c6e40adea928669ffd274ecd3fb665f5ce59dcf5139ba86a214d7c1484e519
-
Filesize
5KB
MD5aae8c6d8e5c68e4aaaf97487ca871d5a
SHA1928172d796ad8daadf5c402bf093a37208db3e02
SHA256c5016ce8108f198173c9b7a1c2816bd1822a123a5e12181fb58e130ae6895bae
SHA5128c24bd628e99e99713a16d5abadf48d85ed15107cdeb60aa4d33c18f27ca63b7b3a3fa70d8db9489a011e85bbfbbd89184a5cc8266d665496c3b152bf117cb20
-
Filesize
7KB
MD57c2ed37195b5cd83eedd934455d701ee
SHA1c5f330aff9f809d2faed1eb1e9f0c5f40bb67dd4
SHA25629d7a06acec1580f73a9e4a2f53b2e60bf5c3b2e3904dd95a777ad2864a3a745
SHA51208c0d690874ff08b9bcb7a39cabe30ed4e2000a0610631234deda813bcbea364d0965feada4b3e7a2490459de0dc982b1e9f5791cb97a329222f2aabec28bde2
-
Filesize
7KB
MD5cb3df89fc63e0475d4abe5ffe01a4ab3
SHA1c4e781d669c08c64e67da8cb0dddd9786ec3612c
SHA25665fb2a64e20e56f533c74fa1a360e859e31a37d1e3b0d52695fa154ce2b6b816
SHA5128ffb0b8ec9c95d161ce191c11e4bac8855ad4b922787eb2e8221d77c7548449289a2c395e88cf6281c8c5191cb05ecce7b62a0a7363f1f59c5a9b01d0a7cebb5
-
Filesize
6KB
MD511bab74a66da2d49c5fad89770452406
SHA1a5c412b27f2f2724d3d06d804882aa8f9b2ec163
SHA2567509ff5505a66b088b3d5f4be5908e908ab6b2355fd541c6586d9cf05fd78fc5
SHA51200b9b24f911346c6d161b6e807ac577925c9b5601287b57cb6bddadbe116c5e7a3de30c76386576ac30e97947ef516e550166466a0a49f626e7a571901bf3e87
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51cce5f27ffa9ff58eeb0eb83f1ea89b5
SHA1a2a0ff8afdd4652f07b81040fd74f3f05def4c86
SHA256ae1fcbc3198da2a6e5128d9f15fab414380014ab3071ea8ecc507ee50a29b715
SHA512040b0614654f5a785a8b83e7cac9c0e669461e11953eddcd4e84f5e04be293b9a8d0a720cda406887c666055db70a9f70f670dd837187accae8c46403fcf9ccc