Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
65814bd2030f9a0561cfb4700601c46f_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65814bd2030f9a0561cfb4700601c46f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65814bd2030f9a0561cfb4700601c46f_JaffaCakes118.html
-
Size
34KB
-
MD5
65814bd2030f9a0561cfb4700601c46f
-
SHA1
8687f5f223be5fca51f671332c8d1978ce188c0c
-
SHA256
0d580e7ad765e86f5cb1ea9af26bf0a3710d790e5cb6e4cbc11c5eb73da91355
-
SHA512
4c8f82e1ca9546d3a0e9f88759483b9aa4f18f919d88914576ee40f09a1e11dcbe947e60d5d8e183a19342872347694ccffe8e0b392d80aa1005589ff255d1f8
-
SSDEEP
768:xFobc1bgJmb2vbnuv67/G9bNK9uDFGoGeT01J34JQYAX2VQIXP:xFo6cJmSjuv67EBK9uDFGVHVZGiYP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3740 msedge.exe 3740 msedge.exe 3748 msedge.exe 3748 msedge.exe 2016 identity_helper.exe 2016 identity_helper.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3748 wrote to memory of 2732 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 2732 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3276 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3740 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 3740 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe PID 3748 wrote to memory of 772 3748 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65814bd2030f9a0561cfb4700601c46f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf58f46f8,0x7ffdf58f4708,0x7ffdf58f47182⤵PID:2732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,17238334009975640722,12230138441536432226,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3276
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,17238334009975640722,12230138441536432226,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,17238334009975640722,12230138441536432226,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:772
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17238334009975640722,12230138441536432226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3096
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17238334009975640722,12230138441536432226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3396
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17238334009975640722,12230138441536432226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:3024
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17238334009975640722,12230138441536432226,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵PID:3144
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17238334009975640722,12230138441536432226,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17238334009975640722,12230138441536432226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17238334009975640722,12230138441536432226,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:1780
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17238334009975640722,12230138441536432226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17238334009975640722,12230138441536432226,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3712 /prefetch:12⤵PID:1892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,17238334009975640722,12230138441536432226,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4792
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5b7fffa9c0b00be6bb4047542c5ab8ec0
SHA18af21bc18e28922416c113899911168f1e736e43
SHA2560b52af7c1ae9d1007612c3ea8cad96841a59d17527dd9d5fb061aeb3af89be39
SHA51235f68ae54bdb12a7aa93648df74da6d33e350af5dce4decb9032e5be67a87ea7fc35d121ae67265b10f7a8cc7700861b7d4a64f9103077d3eee76bee61a2abab
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5220382efcf1c1808564544c017b0992b
SHA1b1cb7ccfeed3eda7e9e59758d6d2674b724984b1
SHA256c320384b0219b8c0a4ebefe143a9fa9e4f6d7f43ef2083dfaac116593d4742f2
SHA512475addb66dd68a448f41b37fc2e3c6ce27c9cce6389ce986a0dd7754e8600631a686671f7f96cfc6176ab46624b95f3639493bd094a0942ae90103da2fdec975
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
987B
MD5607b1d89488338d0591a87e00104d265
SHA178ad8080cd8334a65de60184f00910ca48d5510f
SHA256dd2109585c6ea82696c9084cefa7425308a7a2f7445384bd385191b6a8748895
SHA512c47411a137dbef51b64522c1e2da1c7493850f00ed1704fcfd8e7b17d7b639cd0f696dbe43aa0b5478c6d295d9c02abb7629b264998d4354f43893d4df0d68a3
-
Filesize
5KB
MD53d15634e04c006b5905fb53ac4d15f3e
SHA1608b2f25618da3723a16b48686ae2d08ec4856fb
SHA25603083c7fc651edd97818910421fad5f1d3f0e647b30874e8bb43d3d922b78a73
SHA51296950cf70007a3a2d3a569c442bc77107a3715451f2c0f0b0a43597dc86b375959456360dcbb839f5437ac933b0a10b7d3475ef6ab07be544cdaa19a61c0c28a
-
Filesize
6KB
MD594e4594ad9e50e55edde4cdc57aa8b31
SHA1185656c3c2395492cd0e7c0e111164f31483e0c4
SHA25685ff22657643ddcfcd89f59eca977e62edf7d51300cbd02780532bf878d83233
SHA5125b67e276b81c114e5745545d78847207f5fd9ae2416f0551cd65a6aa9adcf2997ea899bc26ce690eaa60909195f31f40796fae6fcd8cfbc18e8b02fd2d1ca7d7
-
Filesize
6KB
MD5ae0ec35771cc38fe2989dd9727672bd7
SHA10bebb8e1e223f1c4cbf57e4d4beb093e21b5e3d8
SHA256de246846a755531af7535c2d078aa9a5e8ff27fabd738b82f6412e990bfa638b
SHA5125c5dec127ea46e030bfe74b73b631450d149854aa4f5c0ec82caef34047f0c044854aa7752c1bd5eea2ac4733a6ff2e09ce8781f684a1c7d64391a81b4c08676
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD515cfbaaa4d326797d5a9510d01163d45
SHA14c34582a7163565bb31b3a631c08142f7e4c2523
SHA2560917776a9985b4da4b0458c5656ef3c0a9451c09c25e76ee3bb64366a3da3fb0
SHA5129cc9520d11144f83de1e66388fbf3cf9249e4e9b7446fc31cc8e0255c59e316a906ca12c8e4f644483f58c78ba1060b62187f1dd71a5c8caae02bd259de3d53d
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e