Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
68897e4801ce5a54043ac7381958299b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68897e4801ce5a54043ac7381958299b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68897e4801ce5a54043ac7381958299b_JaffaCakes118.html
-
Size
56KB
-
MD5
68897e4801ce5a54043ac7381958299b
-
SHA1
21b852c64c380994061d9db735a37d0b80ae1b23
-
SHA256
b4ecea535204a565a48cc2c16beeb3d54a42286ade2af74a8b1f188aeba3dc4a
-
SHA512
d2483684f638d375cb44a4b9ccbecb6e3968f6c6967ef0094e43a5788d5a5e675678a062806d7296df79a52728a65b00452cdb72e2004d9b4539ab8bb0cd7153
-
SSDEEP
384:SDpw/TOJmAzRlIpFKbrecE/bRWwI5qitV21o3Tj8Iqrh83cbaqDXEVouZUh+zRqD:S2yJHUKbnEjTIIMUh83nw0i4UWjK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4456 msedge.exe 4456 msedge.exe 3716 msedge.exe 3716 msedge.exe 1600 identity_helper.exe 1600 identity_helper.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3716 wrote to memory of 2132 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2132 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4356 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4456 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 4456 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe PID 3716 wrote to memory of 2340 3716 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68897e4801ce5a54043ac7381958299b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffffab46f8,0x7fffffab4708,0x7fffffab47182⤵PID:2132
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,16164749665597627987,13290537571158180672,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4356
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,16164749665597627987,13290537571158180672,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,16164749665597627987,13290537571158180672,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:2340
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,16164749665597627987,13290537571158180672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1164
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,16164749665597627987,13290537571158180672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4844
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,16164749665597627987,13290537571158180672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:904
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,16164749665597627987,13290537571158180672,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6004 /prefetch:82⤵PID:2772
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,16164749665597627987,13290537571158180672,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6004 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,16164749665597627987,13290537571158180672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:2004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,16164749665597627987,13290537571158180672,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:3556
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,16164749665597627987,13290537571158180672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:1868
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,16164749665597627987,13290537571158180672,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:2044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,16164749665597627987,13290537571158180672,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5cdbfc22f1d745816e551a034e6397723
SHA1fd3e774653ac38a7650a6b23dd0474e7a4069d52
SHA2560b201bb1dfe2db322bbdf13edcb068866b0a2abfaca3322f73a72b52178c2b08
SHA512b9757b981968f720e973e329773355473ffec87784e0c35918de6fe54483d1e55b508ba032838b876712b07cdc3e43eeda2748f1d6f1990b4aad5078b7606045
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD56159e84920139af8c350707e78f22654
SHA1913b7c80043bec19c27d832a7f510062d07b3984
SHA256414ff10777bc6c40df082cf520dba5f309bb2680a1539444f6ff88d944f9cabd
SHA51258d9c21015ad82add0bd541dd04d2e47d7904dfdc1f01848b054055bd40b29f3f1a054261d35a62163a7b5b9c583e86ad5c6de372b90e6140a672800b9aaf326
-
Filesize
1KB
MD58cdea5c525c2cbfa5322455d08888605
SHA1a899ebcc643a19159f5f22760c665a9de72016e3
SHA256d77cd3de5c2712807c2f045af813a7d056c1a45e43cba76708a8c206b5871f71
SHA512999f0b4c4fd131c5bf49cdec9380bb57dac5a6179c47de034696c5250b623508296d0fad06d5e3f9550d3192ebac7693c9957313c35942357ca875349eaed3df
-
Filesize
7KB
MD5c488be160cebf3c18a8fda2b7a3fdab8
SHA1fde0de8c9d9695b971b27bb9a2d1c3c9e80c55e6
SHA256301013819e7af1d379ecd49cf61c39be96293bd5776e68e35e9a97673de5360f
SHA5129af84d886c2a1ffdcac80a19a5adeedf5dfb6d23703bd8d21470e2fb1174613d472a1f807e7d70fc0d2f93503b2b9486eac9bcc3cb200e00ba316678b37c0774
-
Filesize
5KB
MD58964f274d577818b2cb2c5cfcfae8adc
SHA1c0bf30ceac69d3eb9da50e390685089b767326e2
SHA2569b9c43daa7a6cdb20ad66c825518132ae269e0635e2ed0d938cb579c75a1e57d
SHA512cdb3ee4c38d8e03615ccb3d170a5706db2332f6e2b73c9e10b799af2bfc0e55b291f1c97438a6ca64c8b8f1fd5e5449dd86f0392b4f1d45631ad120c47098d43
-
Filesize
7KB
MD5e9d8270b4beaba215580e95b4334dafb
SHA1453ed598225a9f257525001eec841aaf0aae9c8b
SHA256ae6dadc51556ad2e3c9c06e2e1c41fca3105e1b018e24d5839eaf2498c7deea6
SHA5129d3181043297e5c81e9366096d618a70d2b70d0cff2e624940c07bab714d2a027573d21463e93ee42fd0dca4bc6881ff7dda7091309b19def78c2355a2b2a928
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5fc675561d7464612e0f61e17aa2c2496
SHA18e88f2da47b5c8cda09a13a9cc2fa334b45fff8c
SHA256165608983aa2483676d137ccb917189288715141a9b17a5fabf10f9a43b694f5
SHA512dd7f7b5ed0083011bf169a9f960d05560606cdc6217ff67d3051b1a84c9e3a7b66b565c3c9d0d2a85000f15b0340df39c37afccff20ad895d306533e99c8aa80
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e