Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:58
Static task
static1
Behavioral task
behavioral1
Sample
68edf89e3c10babbf99d92223ce772d9_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
68edf89e3c10babbf99d92223ce772d9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68edf89e3c10babbf99d92223ce772d9_JaffaCakes118.html
-
Size
52KB
-
MD5
68edf89e3c10babbf99d92223ce772d9
-
SHA1
963f8dd822983710cb5999fff451fd00dc88d628
-
SHA256
cbd907cd17fe1685ba0ce0e2637e830b389f2398297957d019b32a39efdda3df
-
SHA512
d45cb9e0ebc57941d30bf13cd5ea66e83c8dfa42de26ac0fa62df99387f835333fdd305101704eed5457277920f337316d8d1e3f709245886f707f3b3567c893
-
SSDEEP
768:PX8Jrpje0DnLmCQHNeTCINdXZPAkePA1ZsDkDCoYNyL+qD4FEdR3qbdZD7un:Pipje0tIqdXZP0CCjcdR3qbdE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3992 msedge.exe 3992 msedge.exe 452 msedge.exe 452 msedge.exe 4624 identity_helper.exe 4624 identity_helper.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 452 wrote to memory of 3524 452 msedge.exe msedge.exe PID 452 wrote to memory of 3524 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 4900 452 msedge.exe msedge.exe PID 452 wrote to memory of 3992 452 msedge.exe msedge.exe PID 452 wrote to memory of 3992 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe PID 452 wrote to memory of 852 452 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68edf89e3c10babbf99d92223ce772d9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffb884446f8,0x7ffb88444708,0x7ffb884447182⤵PID:3524
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,574143743073800353,1125205823292093824,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:4900
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,574143743073800353,1125205823292093824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,574143743073800353,1125205823292093824,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:852
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,574143743073800353,1125205823292093824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:552
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,574143743073800353,1125205823292093824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3096
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,574143743073800353,1125205823292093824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:12⤵PID:2040
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,574143743073800353,1125205823292093824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3816 /prefetch:12⤵PID:4664
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,574143743073800353,1125205823292093824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:4972
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,574143743073800353,1125205823292093824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6340 /prefetch:82⤵PID:4976
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,574143743073800353,1125205823292093824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,574143743073800353,1125205823292093824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6336 /prefetch:12⤵PID:5000
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,574143743073800353,1125205823292093824,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:3812
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,574143743073800353,1125205823292093824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:1088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,574143743073800353,1125205823292093824,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:4756
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,574143743073800353,1125205823292093824,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
59KB
MD503f7b25d3c0dd894cd9c03c410faa1ca
SHA11c7298d3c58109630cc03f1c1360b4b59047064e
SHA256fa2e1ab6e9ab10893f003538a857ab9e792cbbd2df9b7a3a5470001f3c9b8d06
SHA512ae9d0236bde263c57c2b3cddbb925b3a124d410c9189aab42a152becc0b3c6f2d205e2afb027e6d5b7f8f4124e87efa53f58999f9701839888232df4c0b63a6c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5427dd7a818dd1d7dfa015d330e604937
SHA11654a0b1e4328ce1236e044aa81b6b622d3f495e
SHA256de1db8a32deb894b73121740db6844b5363e63737f6171b1980fbbc277ea3e2e
SHA51268701a411eb5d9bf5a4b73cf50e0679cde578f4b2d318b5b53e44ce97274ceda071ce2700c03514b3721661a9c6c63bed1a9b82d42f1d80b9fe2b71a5ca70add
-
Filesize
2KB
MD582e4f030019a28f10944fd465d93fd0e
SHA12a8b1da1f1cdae65b6cccb1cc9883acdb178fc74
SHA25665064677ec4aa347c105b0561e913da37cb455fed12ceb5ff6a6653ffcd2145b
SHA512ad92f290c369415cb1941670073da009f909ee4e95dc25f4cbe3803d2c4dab78530749340b172676c37f13aae78bc533207c324b80fda539d7272eadb7538834
-
Filesize
2KB
MD5fce6b4b8b0e32b01efadf23e0df5d766
SHA13a25c782ed0450030db24c132e1b2d1c4c52cd15
SHA25687e7c34bf4952fb3aa44ce86f42e9e49cd3b1abe98831fb6b8457e1657153618
SHA512f8cb46208e1e8357ff964b332478e508121ab74872031ff8ec411b95661586411236db75a856efee4c27cbfb5713d716d46d5daaa3bfbad20506ba7648f6f6d3
-
Filesize
5KB
MD5b323cf9c1f0ad2cbf3c8e52de1ffa59a
SHA12ba5ba6191763104ae73d3479d2fe968d953526e
SHA256d2809229f5f8a33ddeb85f428f7b22f28351ec2e0a785bed4c7550c24d2cc768
SHA51265259e73d79349e361a4235c89beee9ded6fb356303c306775449a78dab38b68fc924230aad53177e77703d4b8cfffd5f4624cd63b16679d51601a627d8c6ce5
-
Filesize
6KB
MD5a8114d9c6b4c8dbc12aa10a4251d68df
SHA1adfbb7037b97dad518b477a79267b8295bf8d137
SHA2560fae299cfec5a3b83fd1bd11ef34a2fbba839b9e6b0c673af19c4153979c4778
SHA512f771a017976aab9b4078023ee23d4d2f9f40d8db3b5a2b2c5185f8e8ac6b1d5c1a0cf9c7704a083692ed56157824781aee7760bc37a37ff87f8ad3c9fa82bfa4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ac0165d40421dd2afa672f9be5680ba7
SHA1065b0d73d89ebd2d61ebbaa6c28dc477f0db3498
SHA256ec33db420875c417adad34690687bd8e3cd027a5fcea6637b6ef012ac1ba0269
SHA5129f5a0b02986619229f953b67bbb625b59e437d0c5c319e778c8c3e50c304590978df8b042fc5d1679501d990ebcbcaaeff9290866ba8b4c89f265776d525c91f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e