Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
2849219cf6020c3c5412e28e665cdbee_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2849219cf6020c3c5412e28e665cdbee_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2849219cf6020c3c5412e28e665cdbee_JaffaCakes118.html
-
Size
136KB
-
MD5
2849219cf6020c3c5412e28e665cdbee
-
SHA1
a24f081c371f2d0095d2c31bcdce3e2c5a79263d
-
SHA256
bf2d0540e61cad0d459e4d4846efac0370736e5f5055d00b2f1cacad0d9a26a7
-
SHA512
0919b87b43aa8aa5672c7605e26c83697bff71cb6d7a9fdd5917de893b2f3f50ac42dcd9c0284c0d31a585ba03009f093adc33e347f204fbae997ca5223f0408
-
SSDEEP
3072:hcF9PTpnFLCq+/CT8LKE2cyesGCH1hUzGAsDJ:ho9PT59
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 1844 msedge.exe 1844 msedge.exe 2936 identity_helper.exe 2936 identity_helper.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1844 wrote to memory of 4076 1844 msedge.exe 79 PID 1844 wrote to memory of 4076 1844 msedge.exe 79 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4332 1844 msedge.exe 81 PID 1844 wrote to memory of 4600 1844 msedge.exe 82 PID 1844 wrote to memory of 4600 1844 msedge.exe 82 PID 1844 wrote to memory of 3296 1844 msedge.exe 83 PID 1844 wrote to memory of 3296 1844 msedge.exe 83 PID 1844 wrote to memory of 3296 1844 msedge.exe 83 PID 1844 wrote to memory of 3296 1844 msedge.exe 83 PID 1844 wrote to memory of 3296 1844 msedge.exe 83 PID 1844 wrote to memory of 3296 1844 msedge.exe 83 PID 1844 wrote to memory of 3296 1844 msedge.exe 83 PID 1844 wrote to memory of 3296 1844 msedge.exe 83 PID 1844 wrote to memory of 3296 1844 msedge.exe 83 PID 1844 wrote to memory of 3296 1844 msedge.exe 83 PID 1844 wrote to memory of 3296 1844 msedge.exe 83 PID 1844 wrote to memory of 3296 1844 msedge.exe 83 PID 1844 wrote to memory of 3296 1844 msedge.exe 83 PID 1844 wrote to memory of 3296 1844 msedge.exe 83 PID 1844 wrote to memory of 3296 1844 msedge.exe 83 PID 1844 wrote to memory of 3296 1844 msedge.exe 83 PID 1844 wrote to memory of 3296 1844 msedge.exe 83 PID 1844 wrote to memory of 3296 1844 msedge.exe 83 PID 1844 wrote to memory of 3296 1844 msedge.exe 83 PID 1844 wrote to memory of 3296 1844 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2849219cf6020c3c5412e28e665cdbee_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcaaf146f8,0x7ffcaaf14708,0x7ffcaaf147182⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,4510445160143999746,2848700006862635515,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,4510445160143999746,2848700006862635515,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,4510445160143999746,2848700006862635515,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2564 /prefetch:82⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4510445160143999746,2848700006862635515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4510445160143999746,2848700006862635515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4510445160143999746,2848700006862635515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4510445160143999746,2848700006862635515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4510445160143999746,2848700006862635515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4510445160143999746,2848700006862635515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4510445160143999746,2848700006862635515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4510445160143999746,2848700006862635515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4510445160143999746,2848700006862635515,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,4510445160143999746,2848700006862635515,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,4510445160143999746,2848700006862635515,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4510445160143999746,2848700006862635515,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4510445160143999746,2848700006862635515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4510445160143999746,2848700006862635515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2152 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4510445160143999746,2848700006862635515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1048 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,4510445160143999746,2848700006862635515,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
1017B
MD5993136aae3b39cad4d94bad57aafc55a
SHA1418e1e1300c0d22f2e08611ef14e670d73a35596
SHA2562a8858d815abfea029fba57a59813293285bd0edd711904476c5b3cc4f54409f
SHA512af16bd4cc9144a277a95d255014c3fc2947c2fd76b34e9cd6ad6940fcf5dce3783f7a89ac6077e1906719365f20408ab4a049d29fde73005e41ae104d943436a
-
Filesize
6KB
MD562f818a72780426a78c212af57a88681
SHA1b5edef58eff878c97dcdaf0eae7cca0752215ec0
SHA256e2a313f8b5382b0a382b04bba705bc224b4cf9c33b24441cf18876e1eabbaf5e
SHA51234a0ab71ca37ba933d95431772cd2bc93315d32bed75bf34a8835bed2240d903e0e29f144585170403e8efc359d1d842f1dde06d356e33f5953aa2a00f465633
-
Filesize
6KB
MD5ef1163c1da8a47a6accb24f8bcfa00b9
SHA1163075ad758930950a3b96db03f89b7d50118136
SHA2560e812c38c5ce79ddb3a1473f662d0dbe035543e70e778906943b5186e5f1ddec
SHA5124d06bfe3f55813960431049c0340fa2cc2e9056dcdb873970cff160abfe49c0cda18181a80d49fa6310800937e80fa3267b534fe0c3c296a85089c8238b91137
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD549e9f6d4e62cc7092aea667dc86dee81
SHA1f1d6282c6343696a6c095a9c5c12b30c4db49c77
SHA2562095460e4a0d7ed444833e6f075ce1b2b45c2016885e6d1461f68084a8416059
SHA5126992df12fd81b2340baf1a1b53a9fd53ff880b4cfbe965a3ad5faee867f82f01fd25a32951592e2341c52c704241b575f32d2c390f3f9318563372b0a5a2d035