Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 00:33
Static task
static1
Behavioral task
behavioral1
Sample
655bc0ddeebdf68671916807eb07ae80_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
655bc0ddeebdf68671916807eb07ae80_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
655bc0ddeebdf68671916807eb07ae80_JaffaCakes118.html
-
Size
106KB
-
MD5
655bc0ddeebdf68671916807eb07ae80
-
SHA1
b1bb62ffbbf2bbd7e59aef003669cd856515da7b
-
SHA256
7309237ffd5f7141522bb92b58d3dee6640f32f21c497df5444aaf078a5b82e1
-
SHA512
be62203a40c15ad9ea98f4cfece497c84cb393dd407d3fa916044eba8a91050450dec35da724ed2bc59938cf49e781ff12a0b1e148c18a2e51e7378bb0de25e9
-
SSDEEP
3072:M222o22UcHLp1xkxHgp3cXmNRS+zK6M0RC0/mFkPYB:M222o22UcHLp1xxpMXmNRna08
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2264 msedge.exe 2264 msedge.exe 4940 msedge.exe 4940 msedge.exe 1912 identity_helper.exe 1912 identity_helper.exe 6124 msedge.exe 6124 msedge.exe 6124 msedge.exe 6124 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4940 wrote to memory of 4716 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 4716 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1516 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 2264 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 2264 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe PID 4940 wrote to memory of 1672 4940 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\655bc0ddeebdf68671916807eb07ae80_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9584f46f8,0x7ff9584f4708,0x7ff9584f47182⤵PID:4716
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,10536133968511722890,7885780175900037516,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:1516
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,10536133968511722890,7885780175900037516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,10536133968511722890,7885780175900037516,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2296 /prefetch:82⤵PID:1672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10536133968511722890,7885780175900037516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10536133968511722890,7885780175900037516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3120
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10536133968511722890,7885780175900037516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:2672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10536133968511722890,7885780175900037516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:3724
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10536133968511722890,7885780175900037516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:2404
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,10536133968511722890,7885780175900037516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6108 /prefetch:82⤵PID:4128
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,10536133968511722890,7885780175900037516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10536133968511722890,7885780175900037516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:4004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10536133968511722890,7885780175900037516,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:1632
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10536133968511722890,7885780175900037516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:3088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10536133968511722890,7885780175900037516,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,10536133968511722890,7885780175900037516,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD535f6baad82eeadc3ca3306aaffbf77d1
SHA1f55ed5da9fc05100c2b8a0a386d2bf455c243e22
SHA2569e3115e798244b6b8b71c63145fe47891d801d458926009e997441baa83947a8
SHA512f9cb3bb87a5073013778521fcff0c5b0cc74817940ecb66593c99c8f8c5f05a2fa0046588d4b974808aaf24f9a818ad7c5f6510bec242bdfe3ad7efe0017fccd
-
Filesize
1KB
MD52b5376c39bb69230e6a308c833144ac3
SHA13e8c6f4a7ac79f27473d2807eca4b7d469453ad9
SHA2566a89a566cd743c7ab844d9b71657330b7c476d1d63b03b837eb46792a9abaf15
SHA5125e33fa7c6f1c3d6dd7bf272b8d309dc115ff1be0a641236f3fd6aacb698a04dc2e8c905828351bcb2975457f246584d1ee281fc4f44f2fd1e9da92dfb9393d92
-
Filesize
5KB
MD56af0dd6b05289300d91b7c12753e8526
SHA18a7a0f7e6b6da3740776361c982f6e1be63e374c
SHA256bb7922c88229d80dc6e2c38bb95afff6aee5eaeac747699543083af8e2bdd4a3
SHA512e48ef6cc70742d78b6d42c037f2baaa3627e4dd34e4146d67e2a07c52bb5bfcdb438d8eed58fa3234d38b24df323244ca49751732c63d0781b84eae2d6af91e9
-
Filesize
6KB
MD5b406f7fc9181a9170656c28bbf1689cf
SHA129b4ce03478f50a424a0cba78d2f15a4b41547b0
SHA2562739a485c6f5a0a7b63ae741acc77f578b6bfbb33f10ffbcd94b4fcdb66bd441
SHA512e154c891e4b807aff6e2fc2284858063d97e3716de3dc997122c41a6a733e4704b84357257dc049f07d8065dece7eaac95ea4e62d7bcc508aaaaa73f26c76a2d
-
Filesize
6KB
MD5c3bb396d28fb3212bceca4ae6fe4b4a7
SHA146ecd065dd47d3f022dc55bdfa9727cd8ec61fb5
SHA2568e5d72dca905a2250db2fd0bf193b721507e99e9c64c8f82dc35c5fbe7d8879b
SHA512ef0e3b62c5d8c735e317c7dbe75c1b1582a7fc4857082fa8d3bf221918ada8ecae9f24f60b475544ca2cc9ab93c87da1912ffb3e167042df03df6302d0e5dbf5
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5d92e09fd9ca04b1dd4bfd4adf633648a
SHA1a2607ac7d325f9aad1b507b44f91bd930870316a
SHA256036c5e68315b5ea4b17808b2824b0b1f02b64ccffe1bb5baaaa57d426cde6273
SHA51257209e4ffcc3e5285d53f2b074027c65d4eedab59c9a0692024ac7a68042ddbbe530368ff7b8b768c7023579b8b25c43d7cf02e4ee82599b2ee96925d233700f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e