Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
694b996e44ac9b56e20d3b474fcfd1b4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
694b996e44ac9b56e20d3b474fcfd1b4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
694b996e44ac9b56e20d3b474fcfd1b4_JaffaCakes118.html
-
Size
114KB
-
MD5
694b996e44ac9b56e20d3b474fcfd1b4
-
SHA1
fbdf3d320151b2035dd3953778eceea6b137d4e0
-
SHA256
94b9e7b3d54fb84723e3bf414de2183c443087dc9ea07dd89c842a6b08b62b6a
-
SHA512
9dfdbe58cc0ed593698e5b34cea40e3c6493b36ae07f824e9ab7a3fe550b624310ba3347e6d0a97c62731414528c56a08cdceddae8b9663c0ac0f6ac71546da0
-
SSDEEP
1536:IxMejacfHsr4OlDJNYh8JxYx9XG+6IAmMCtpKWZ1xBLkLhGyc:eOl9NY2ojXGIAH0pKWbzKhGyc
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3964 msedge.exe 3964 msedge.exe 1684 msedge.exe 1684 msedge.exe 1728 identity_helper.exe 1728 identity_helper.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1684 wrote to memory of 5004 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 5004 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4500 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 3964 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 3964 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe PID 1684 wrote to memory of 4392 1684 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\694b996e44ac9b56e20d3b474fcfd1b4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9eb546f8,0x7ffd9eb54708,0x7ffd9eb547182⤵PID:5004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,11830802372134783264,7645552041256262012,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4500
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,11830802372134783264,7645552041256262012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,11830802372134783264,7645552041256262012,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:4392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11830802372134783264,7645552041256262012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4308
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11830802372134783264,7645552041256262012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:5068
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11830802372134783264,7645552041256262012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:4828
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11830802372134783264,7645552041256262012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1984 /prefetch:12⤵PID:4812
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,11830802372134783264,7645552041256262012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:2724
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,11830802372134783264,7645552041256262012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11830802372134783264,7645552041256262012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2908 /prefetch:12⤵PID:1128
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11830802372134783264,7645552041256262012,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2184 /prefetch:12⤵PID:3004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11830802372134783264,7645552041256262012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:636
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11830802372134783264,7645552041256262012,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:3504
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,11830802372134783264,7645552041256262012,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD53079e47726da321f7d99062e5f079fa2
SHA120803c37cd7c92c3ec5f4dbd81f21176929db926
SHA256dd289b700236404eb02f763515fa0e2d825328d9fefe12a22e9c9f628b5ad540
SHA5125ccd6044ae2f0697769d9fd293420c6b4ed6b8802b2e3dd395697852e19357bda3b85c53d41e8ade296a96179ee594924a124745f73a8308a9013d6fa455f5f6
-
Filesize
2KB
MD56c0428c996349d3145142a38e98d0822
SHA14321c7bb1413917cf5de3c712ee8f4e7b7c656d2
SHA2567feca3428d01a63dff5a578c17b81e9b815e804975b7a61222b571d5eb2773b7
SHA512f06d8b68c38812bfaca619f50a8ea2257c329d9d97ba3f3f047bc376d7604a598467fdc4420500ab68769d3b8080901ac553d65efc6d368aa8f9070dc5a0ef02
-
Filesize
2KB
MD58413666c20382543cb157854e853043d
SHA1345b2c106444727f3e840bb8e73341a4c272d0c4
SHA2562311b5ceb6a47a01a3971c11ddd030d80ad58308f163b276c5014a818d0bd2ec
SHA512f301ec3ff687bba8c2d1c1b7eef529b32e46b09c9d466824337d04d9c04b0a0781f266023c3676f47d32c18b631336fb8db5aa717a7495fa26d701fb566352c7
-
Filesize
5KB
MD55b4a1c8bf9657e9ed6d387508d78d96f
SHA10a07964ccd2bd201dd25cebf3acedd4587e50918
SHA2566cbae926be1a605e02aaa7e33326c4552465eb9239c4afceeb0995ed1e68856f
SHA5127f21b80f64275c78a9a09846edde1c8bbfb1a396898ccbd11a65573be3e3e797d4ffc7b0b594f853f88ba04538ed3e03de6ded8e4e0df8ff14d010d11ff8c4f8
-
Filesize
7KB
MD55515a823b7f4534bde4fb5871e28d1a3
SHA137f7838994ef31d0b34832a897406fd520edc1d8
SHA256b256568e8571126c4d3092f2b5a1814047ccd17a820e54e7b20ba4528e622829
SHA51202a1326b2e8f32a4f925e703ec511198c4b107da66391723e96a675d4c0684148f2eb22abae09eb22c0d1673a111b44f0d01191bc6dd8e37ea50a4cb09f255ac
-
Filesize
7KB
MD5692037a07a1f19c5e5bb8148c4ed28af
SHA127e7e616c3d88c5aeecdbb6c3d42ff6ec09b0cce
SHA25649447b26731042e9eabb2f8738110b8333d38cccc29620b4e93b8a3b1b016521
SHA51256c3f2f7d21818296630475d8a0c0c839026142e03349ee310827ad533d7c9f1dc26c99837e784302c0e0932988b6ddc0798978e46a3bc71b9ef2737b0388eeb
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5359af31e597aa5a43b36c6f577c13e30
SHA12e56684250e9f2acd4c390187ed18835b11f3e14
SHA2563bd34cf7abdf063b7a6c0dd7635ae004f0c3020a0b0453f172fb51bcf581feb6
SHA5123fb041c1a0a103ac7fe930a4a7939ab4884cd19024187965f3e187c89373a47666ec946cc80876ebf7545c69362390e85e4cf6854ee9f8d99311d37dd9e6f7f0
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e