Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:20
Static task
static1
Behavioral task
behavioral1
Sample
687ff45b61ece2bf2e39e928e85d32c3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
687ff45b61ece2bf2e39e928e85d32c3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
687ff45b61ece2bf2e39e928e85d32c3_JaffaCakes118.html
-
Size
41KB
-
MD5
687ff45b61ece2bf2e39e928e85d32c3
-
SHA1
b26bcffac025ff87583a0dafd785398a96c21422
-
SHA256
b31f30eba15ba7e1c2f073c282e5cbfc8be9243a0a4a7b6ba8896214437f8377
-
SHA512
f82ea2f512c4d455117233eca11976b8c4611748d9014d8d2fd0a48869432b07dfcba2bdff577414bcd72cf62bbee5d3af3e8bef6a50cb7704e04aa7b17d8852
-
SSDEEP
384:SRWbF6LqBNrrV5JcddM5Y7+Ir9OZXBze/eXZ6QGJDGYB0aYaC0aYaC0aYaC0aYa9:SgML2JrVqoBimXsQ86BrH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2064 msedge.exe 2064 msedge.exe 1692 msedge.exe 1692 msedge.exe 4252 identity_helper.exe 4252 identity_helper.exe 5192 msedge.exe 5192 msedge.exe 5192 msedge.exe 5192 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1692 wrote to memory of 748 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 748 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 4652 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 2064 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 2064 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe PID 1692 wrote to memory of 1708 1692 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\687ff45b61ece2bf2e39e928e85d32c3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd92e046f8,0x7ffd92e04708,0x7ffd92e047182⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,10807858419628478792,10865542930696381002,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,10807858419628478792,10865542930696381002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,10807858419628478792,10865542930696381002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2476 /prefetch:82⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10807858419628478792,10865542930696381002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10807858419628478792,10865542930696381002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10807858419628478792,10865542930696381002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10807858419628478792,10865542930696381002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,10807858419628478792,10865542930696381002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6188 /prefetch:82⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,10807858419628478792,10865542930696381002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10807858419628478792,10865542930696381002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10807858419628478792,10865542930696381002,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10807858419628478792,10865542930696381002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10807858419628478792,10865542930696381002,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,10807858419628478792,10865542930696381002,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2412 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5192
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5759f1eaa2f87242f4f30b294a0b67076
SHA10d2c247b318f7c65fc518a386f14fd07cb5e605e
SHA2569bb449e9a1482734428bbc055813fa2bdf2f869d029958cb5a6feb3a2f52f48d
SHA51266b2aa05912fab19f95d28352fb81d60c22c19097feb65836e86d961377a41a4c29c3619485df311901fa5939d28346cadf265d5c6ef1a4a5239aee39350ceac
-
Filesize
1KB
MD541212d616b8459fa8e1a32b26ec9f30e
SHA1d1dcb11984b344c5eb62713120ace0aad4da25e7
SHA256637a05be33e3bc2ec1288f2fc717112f7558f6c05347bca7c8f2eb9ddd820829
SHA512104f4510ca3746a5fcf4ce3c13d78e7c658c8c6d515ac4098c2e34607afb3424e31fc63f056685a50bfe8d9776c5918feb26fdb9d716e2bdaa03e134dafba957
-
Filesize
5KB
MD591fd24969c62078a88d26ae353f8f3f8
SHA1114cfb1eb0c0b94708b9cbd3b75cea21926f607c
SHA2569cc5212ca06324bac149cb20eb0cddb47880d2137a96dc3f132655780b526175
SHA512c55a6811875e3e9665263708bbff151ae013584f060ab50bb6e7de007a2b61a9b1c1e73fa50d026d268dcc421f0e8e02eea5dfcad85d9637e71c71453ca392a4
-
Filesize
6KB
MD50dceef08437d0db349ccca3e0d985e7f
SHA10182e423e546488ed98610b51f45b52bbcebe7c7
SHA256c5db374c76764b1d7f98902a7ea89646099a44a02fc752cc53e3e53cf306695b
SHA512a013d49ea8f3babaa3eafefe874abbaf00d6701e75efa6b1ca1d80f94c8e8fbc5f022648a4c94d95d90af6be3db9fb291cb4dfd2bb586d067083b9131b52b395
-
Filesize
6KB
MD52f308fcba7920f61d11e8f29079b0b3d
SHA1921e2fdf0a160344e119eee1d9c2b1395af70cbe
SHA2566c99636f88dbf9582dc9b15ea2485ef7ced02a34ffd0c5c2f24713b5d69ebbdc
SHA512d7be733f7658f774e653ddddf5355db971a6e680481e8db28b0634891aa761ab32f39967c2136099f6060b4014b7bc02e9cd95d291481c65e061afe9ce87bd8c
-
Filesize
537B
MD51bbe6a966d747e456a7ef8b1e8930b6b
SHA1b1c378e702ae97406c35a75212fac8c4ba6988f7
SHA2561d079f441fa0cbbf34a858efe1841e5993bf41fa240f9b586c705f404fe8c959
SHA512461ed897df49ffabce28daa884cef913370de228f528142e9bfb03c76671cfb23d5c2fc98ad580161acafef305f7ebeeb3198d233cc576cd8cfe92e21e7a8fc0
-
Filesize
370B
MD5c7119ece36a0304ead66c674dd8d7e6f
SHA1ea5d453ba6ce36762ebb86b9dad55cf298d5c96b
SHA25669feae1a506ab4d6380bb0d094f1d615e31db1027113925d2fd7d274935a2a07
SHA512a6098695f87c202e382e00497cb79fc8fca9502fa84932e5104e262bc61602372b9578c457bb3a3efa9552886266e3ef0899ecc290959623e8375b611a7e2b7f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f590d510e5800aab70be0ba9b952012d
SHA1eeb9b7f3352552c6d4d2e95b09f611ffc2c56c72
SHA256a33db6a42c55c976b80777ad85a031bcae2a1812d403139cd5e8c729b60b9984
SHA512c403e202793cbe7191765a38215f750c6e11a9d0e7be95568f6821b0a3ed678050e4a28bf63951bc4bb84fb8aa0de9a6d94c758d2d4bc15d3002b51d6685d36c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e