Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:57
Static task
static1
Behavioral task
behavioral1
Sample
65c611b1a68c25588bd0dad74b7dd02c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65c611b1a68c25588bd0dad74b7dd02c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65c611b1a68c25588bd0dad74b7dd02c_JaffaCakes118.html
-
Size
97KB
-
MD5
65c611b1a68c25588bd0dad74b7dd02c
-
SHA1
6aff37f36fd920c8cbdc154c5dfeb77be8b28cee
-
SHA256
39a0e78ad141602ff5d0d36d52c14aa2bf51200afd3c51a68a3fce54afd69b3f
-
SHA512
82449cb8a6cc0ef5aecc999a83a0f0c220d9182ad997d7fac07cba3a06ebde97577f1cb45c65c01c105869d44894cbb60a067012cabd733e5bd67b4516f1eae9
-
SSDEEP
1536:r1zrHoEBaVtYGy1XfsTHBD0bUwHmE4U+Ot5:r5otny1XqHBD0bUwHmE4U+Ot5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1280 msedge.exe 1280 msedge.exe 1864 msedge.exe 1864 msedge.exe 2988 identity_helper.exe 2988 identity_helper.exe 5500 msedge.exe 5500 msedge.exe 5500 msedge.exe 5500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1864 wrote to memory of 3444 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 3444 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 4760 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1280 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1280 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe PID 1864 wrote to memory of 1492 1864 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65c611b1a68c25588bd0dad74b7dd02c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8cf6a46f8,0x7ff8cf6a4708,0x7ff8cf6a47182⤵PID:3444
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,13994547134248060635,2999591291238814018,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:4760
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,13994547134248060635,2999591291238814018,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1280 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,13994547134248060635,2999591291238814018,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:1492
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13994547134248060635,2999591291238814018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13994547134248060635,2999591291238814018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:680
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13994547134248060635,2999591291238814018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:1732
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,13994547134248060635,2999591291238814018,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵PID:1556
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,13994547134248060635,2999591291238814018,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13994547134248060635,2999591291238814018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:664
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13994547134248060635,2999591291238814018,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:2820
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13994547134248060635,2999591291238814018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:1856
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13994547134248060635,2999591291238814018,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:224
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,13994547134248060635,2999591291238814018,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD52a4601282be7d54c4ac2641e9d2d1096
SHA14fb99eb3838430709ec0937faa170b10c6d779dd
SHA25677b65505b93d32ae24efa80436f3c5fa3b2e55e7be7beea4efd96059d242af1e
SHA5126a9e918835b0431c1b4fb6f799350d4a88852297bc588ca2ab878aa200d317d653b96ec64e536603b38fc72907869fe5ed0e86ebe74747764e6e73a80bf12396
-
Filesize
1KB
MD5f2924329d2e36edaa386cce7ff6a765d
SHA1ac892b27a95b26f5ac36b95218cd317079815e4e
SHA256041bcead16cf25e2415a39b9aa67822b2100cd319962bdd8848afc23b58689c6
SHA512d9177dc2a03cc40ba3f49f1d3eac44680ba8a532008642d3c4b03c58fb6a90619838fe67d24b15587c605a6b0989a37ed6df537efde9b9b35acbc3b87d754bfa
-
Filesize
5KB
MD5af80840bf8a1f741ff96b1f918e9cde6
SHA1b34a29d48ab677ca31216facd73f74a5263f4dd3
SHA2562bd7ef212a549985458161d7423b1d1eae799f067d129ec9a1d630d2fa49af76
SHA512875895f5d38ebf3a0c78e56426eedd982e80794fd283b46fc7456a6af4e30a7c74581f9a832155fb912f6f0964de2227b2fbe4fcab536e753cd779ad447bdfd1
-
Filesize
7KB
MD5822ba86cc98df7501b4bb66e6c1311a4
SHA1e9370086b4f228086148a7488db635a682da00a2
SHA2564f41d73423db8444348a853ca34752ba1236057a810b8a746f0793c4489c46ab
SHA512f17dfdb29965a66a0d3f3467f5ce42d54220c2a012e6662d09b0bb6fc7361069dae238a3f2679f42bdc5c1243c115a93b3e51776242517c721b942700f3be57d
-
Filesize
7KB
MD58f57e3df804e7c83b8bf62d350096705
SHA106ada27d9b97402b2a0a6a186f69d7b12df51ff6
SHA256686b4ed3a7785e763c3c514f4e538045827fb041108e0f9bfb16dc56d7dda7be
SHA512c6a6c0734f1f7feb27e3c0d3ae4b9a8b4a71a188b4103c66e9d9ce3cfad613613de769a52b6a66498fabaecf0ef328679bc2d59a3f97f572b6c90ba67456b196
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD59fcc759f49017c973df2904fb392eb7f
SHA10034ae2280b19a6917f19d2f354ba43988a71ae2
SHA2562cbd0f96045c7de4bc5a1729d458db8eb25f4a9f285857cd4c553d89093fc75f
SHA512d5b5c625c5803a76a4135569bf9d602d96902d94dbd455c0112f7708bbca8c0da4858ba994e9a8dfd7a6a7e1657ea5d6d47bc6ac2d94e681ab0407b747db5a50
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e