Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 14:03
Static task
static1
Behavioral task
behavioral1
Sample
d4879b4230ddc8283220203ea9a09bb9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4879b4230ddc8283220203ea9a09bb9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4879b4230ddc8283220203ea9a09bb9_JaffaCakes118.html
-
Size
175KB
-
MD5
d4879b4230ddc8283220203ea9a09bb9
-
SHA1
97e174beeeb96dd0fb2c1d675e35b9ed4c9c60c0
-
SHA256
7729d02a1a37957795d7c1174781c9451019bc5ca95ec8e83eeffa8ef58c9fb2
-
SHA512
05b4ca88ffc616be31e9277a7b0c1882961d22a8dc4ed4d22e8c78ed82e7906ad2d71ee9d4abeef978cc744c1f183fba0e9f63eac732cfa0495ee553e3ac6755
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS3hGNkFGYfBCJisM+aeTH+WK/Lf1/hmnVSV:S4oT3h/FPBCJium
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 3256 msedge.exe 3256 msedge.exe 968 identity_helper.exe 968 identity_helper.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3256 wrote to memory of 5084 3256 msedge.exe 83 PID 3256 wrote to memory of 5084 3256 msedge.exe 83 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 1448 3256 msedge.exe 85 PID 3256 wrote to memory of 4864 3256 msedge.exe 86 PID 3256 wrote to memory of 4864 3256 msedge.exe 86 PID 3256 wrote to memory of 4608 3256 msedge.exe 87 PID 3256 wrote to memory of 4608 3256 msedge.exe 87 PID 3256 wrote to memory of 4608 3256 msedge.exe 87 PID 3256 wrote to memory of 4608 3256 msedge.exe 87 PID 3256 wrote to memory of 4608 3256 msedge.exe 87 PID 3256 wrote to memory of 4608 3256 msedge.exe 87 PID 3256 wrote to memory of 4608 3256 msedge.exe 87 PID 3256 wrote to memory of 4608 3256 msedge.exe 87 PID 3256 wrote to memory of 4608 3256 msedge.exe 87 PID 3256 wrote to memory of 4608 3256 msedge.exe 87 PID 3256 wrote to memory of 4608 3256 msedge.exe 87 PID 3256 wrote to memory of 4608 3256 msedge.exe 87 PID 3256 wrote to memory of 4608 3256 msedge.exe 87 PID 3256 wrote to memory of 4608 3256 msedge.exe 87 PID 3256 wrote to memory of 4608 3256 msedge.exe 87 PID 3256 wrote to memory of 4608 3256 msedge.exe 87 PID 3256 wrote to memory of 4608 3256 msedge.exe 87 PID 3256 wrote to memory of 4608 3256 msedge.exe 87 PID 3256 wrote to memory of 4608 3256 msedge.exe 87 PID 3256 wrote to memory of 4608 3256 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d4879b4230ddc8283220203ea9a09bb9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffead0b46f8,0x7ffead0b4708,0x7ffead0b47182⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5756904159771497467,11221862253311387078,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,5756904159771497467,11221862253311387078,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,5756904159771497467,11221862253311387078,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5756904159771497467,11221862253311387078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5756904159771497467,11221862253311387078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5756904159771497467,11221862253311387078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4336 /prefetch:12⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5756904159771497467,11221862253311387078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5756904159771497467,11221862253311387078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5756904159771497467,11221862253311387078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5756904159771497467,11221862253311387078,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5756904159771497467,11221862253311387078,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5756904159771497467,11221862253311387078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5756904159771497467,11221862253311387078,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4432 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5756904159771497467,11221862253311387078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5756904159771497467,11221862253311387078,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5756904159771497467,11221862253311387078,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3452 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD51da4bbf947c057067c77829c4384edf8
SHA18f4e05798f260a1459b9a7fa95732b1b9db02430
SHA256157bd30681268e36a6b7ab4c13882091b1fd71d8fa2a8e4ae13a7603cc45cc62
SHA512270d7af5fdcd6784a43c3f0da2ca00680533e9c56e345f510946bb47bb3d07b139664f5d6f0aeefa701d0d0dd84d49467ff637cd4adee4254852af0e460a0e42
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD54d91c38e1e4534ba5ba6935e5dd8c874
SHA1795626046d48dfb8841c534d98f258328b3b82ee
SHA2563c143d3e97d8d6ce24f823bb5a493348ecb3d72c186c18fb9d3a5b5c085148a4
SHA5127cdeb41701fe4aa3fe4ef5e99940567863f588dfbb279543d164f276ccf5a4097822a01bc63b62d9e877d7ae56fd8db113b64edb4e72e5fb5205d07d70f8d00a
-
Filesize
2KB
MD59845c28de899ab7dd6be20971fc750aa
SHA1f5bd6dd00643fa97ff71303b76af035162736be0
SHA25664466574f0d5b5eaab595c7fb25ea2d1bf4e7eccb9832c0328bf9d6e75255370
SHA51236964f63e1ff7a70c562d44d0b6b87d630896ce3e11c6ec2fe7abcc3e073fd163e35de59638ccf150df44da01b06d9e301c25a697068a31f9443b6117d44a9a0
-
Filesize
2KB
MD529db2b4e2f0b295788c37e860c2c6b2a
SHA1eaa8d94b65b6cad8ab8df35a0c0c92d5d4f4c5f0
SHA2567d0e9a45d88eec303894ca44fda8cf9c58e721205fd95818104798e5dd975d21
SHA512ff43b9ee20320376b52a6ff79c34cbba43ce6a85537272fac6d9041f9bc5b89cbde8e4cfbc4330776bd649e46786f5737d0aa53e45a4541e672695403d473f18
-
Filesize
5KB
MD57919f2aeff5ab832a211714b7284e2af
SHA18d55f875a848579541106588bfb814c6a2cc3a46
SHA256e73bebaf3fed0faa1686ad5ffd2d05c4f281de17d0910e82a43788e2f1fdccf3
SHA512104334f010af7406b32477e6d79de282fac08bf6880181f23ace690354cada4059f84f593d520d4a766046e522cc244994412ae3d098b59db340448096414d25
-
Filesize
6KB
MD5a1237a804d52f6e5bd10c7d3a5680c08
SHA12960d30ad688e7c4111624959bb47a62b4f32197
SHA256a9495ba39d08c2c73b74d40d1dceb84cea7e26621026c9b031c5a5d649aa67d0
SHA5123e4a6214e913be5ddca8134f11e69ba7e75bf71fed6927f5a63b30236fc0fe9a446a15a16456eb08ed65acf5ed9eb86ded3f5e9dfbb0aa7299abac69fe87e4d4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5bc254c9dbecd858cf2bdf9b465b488d0
SHA17d365881c2d863b62af62bf7040e1594394fe14d
SHA2560a147921156a61f2e714edc14a72bada2cd52c85fef6d538d72d24d3b0b9efb7
SHA512c2d3c50a8c8d5c360ff7b018e26c21dd90dd147c49dce9b43f0af23d0f2161950d16095e50bf7bce567ba09c23968e271035959c6013cbcf16d320dec8be85fe