Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
c42871c91e160e3fb48987e3392a5431_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c42871c91e160e3fb48987e3392a5431_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c42871c91e160e3fb48987e3392a5431_JaffaCakes118.html
-
Size
79KB
-
MD5
c42871c91e160e3fb48987e3392a5431
-
SHA1
339dace6d2590d0b65b9a3848dfc3a706ced1369
-
SHA256
43275983079410d5775106800f74d14c18a0c19d02161136258140be4cd01d2e
-
SHA512
497008e7ee67040797f1b56a93b6e7bf38de0f67e9f6ccd685ee3b8b9e5b0017b331ca81aa32baa2d84aa3c4c09fc658c03a72bd498a1bb1683df10433eb0ae5
-
SSDEEP
1536:MkXppD0CBeiOZkxF/RqqDJSdWHrfBhkg3qDH9tWfK:MkXppD0CByGxF5qqDJwWHrfBmIqDH9td
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2628 msedge.exe 2628 msedge.exe 1592 msedge.exe 1592 msedge.exe 4036 identity_helper.exe 4036 identity_helper.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1592 wrote to memory of 4964 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 4964 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 836 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 2628 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 2628 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe PID 1592 wrote to memory of 1200 1592 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c42871c91e160e3fb48987e3392a5431_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa159846f8,0x7ffa15984708,0x7ffa159847182⤵PID:4964
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,6550143121612119265,11019193618758537284,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:836
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,6550143121612119265,11019193618758537284,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,6550143121612119265,11019193618758537284,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2300 /prefetch:82⤵PID:1200
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6550143121612119265,11019193618758537284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3924
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6550143121612119265,11019193618758537284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3980
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6550143121612119265,11019193618758537284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:1660
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6550143121612119265,11019193618758537284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:4000
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,6550143121612119265,11019193618758537284,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 /prefetch:82⤵PID:1384
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,6550143121612119265,11019193618758537284,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6550143121612119265,11019193618758537284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4412
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6550143121612119265,11019193618758537284,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:3828
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6550143121612119265,11019193618758537284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:2292
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6550143121612119265,11019193618758537284,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:4172
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,6550143121612119265,11019193618758537284,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
23KB
MD5a0423f1305547bb6b8f5a4fb1a9fc2d8
SHA1092dcf1fe57e6bb53821eb754e04188ee70602d5
SHA2566add651cb411ed9ce9a17883c1522920a6ee3b4eb676f5b411e72d1a5e7de6e8
SHA512b8487c60b40d332e562cc5d4fc7c515e3b3c2c82311700b788905754c1376ce6f0da650583545a4691d51f04ec5da0c0204997214d167c85b788d4c85236c4c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5e623330acb44eecbd22d50955747d7a1
SHA185ed63cdd732ff6d3946f264ef006c06d0dd94d9
SHA25652cc538ce5a7043036cead99d5aa0bf1ee8bc74ac71f75dee5bcace3f29c26c6
SHA512567173903e69c66f6b8aa3656c5caf4f71ab3d9caee6293a1611db4097af3fe9f13a817f9e10023fcb00010181f22e6b91f6767d300bd81b08bfdd55b8bb0503
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5835babe3ca64d0478a607f1dc35258a5
SHA12f06f9f70f9d5e54a20e4f652325ff53fd2286ce
SHA2560be7d0e308f15f925296e04a60648cff5d99dbe649c1d840766bf3d6c6ff3e52
SHA512510c8dbdc21310971c3f5f32a92d9533b9b59f09d558dfa65385c7e63b4ad91c8065904a49784221ecb7e3cff6927e4e5579429849a206a42444afe9a5e28a6b
-
Filesize
1KB
MD5980677a4fdd4115fc3fea30c7e04077d
SHA1e7de87bc9be907c3c51707771bd1077c4babc97c
SHA256c6b9cff20f2edd9065d82df3eb3962107575606d8714693ac9bd3c81baf28771
SHA5124da2badf638a4ee14b9497c452b9010d4f23948436688b15eb5206dde290ed87a9120e9c2e58258f42164b9ce15e4504e9d491eead2eae4ddbce5a82473d07f4
-
Filesize
5KB
MD51ea0aa845c8ca470dde1ba3004319e8a
SHA12eb4b0e0a03ec350978d200e297ad64e5c5ad710
SHA25615193de72ed98e00ec2299c6ee48dfe0b6f8426d275408e80a46a4fa02f5bd3b
SHA5124602209fd9df788cefcdbece7e140929eda907105f72608570af20ec72071422b04c4b153c0dc9a0d7d1ba6b838094e509ba637bdbb0568e9f4032ec353ae80d
-
Filesize
7KB
MD5dd61ea821c3da909eb7d3666c09f3827
SHA1e7e981bc9e5ed8ad3d49e5f4bad20f8f8532a55a
SHA256615198bed2a003d4d2de78dec89ccf3df949542325dafe0620f8d7d5336bc26e
SHA5126f96ce21918dc5f87602ca26d543f9a59db4a212b120f6dc6223773a2e39826d4e02f026eb969ac9cf8a6bed0b9699e055686df6eee648f03abbbd06237d7019
-
Filesize
6KB
MD5fee4d0de43c07dc917a571c1a480f074
SHA1681c42ef20eaaf8684fe488fd39a3f2bd8711d96
SHA256beab2f6bb5f2d2e737aa85d4877fe29f7d9cb377febf2f4f25895588c7cb0a36
SHA5121e61d45eee7d97aab15211dfdbc05326a54a0824c0a41f5b0aae2856e4ac1dc8afdc09089717ecbbcbacd3464081742b62b820078c63b09bfa2aed7c773922d5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5942bec342559b25fd877bed5f2216de2
SHA15b050a2666acd5ae572a6b9f012092afbc71b207
SHA256c8d998649f245649f27029b022f1ec2b72f9de47089770feb3979239c0dc5dec
SHA5127e901b9671ab5720456d52049a530b580083472d0e71db9247ee2ae77c614b718bfa55bfcfdd3b71a53840666405df15b14da704553779f0e6b391dc318df2cf
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e