Analysis
-
max time kernel
152s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 04:47
Static task
static1
Behavioral task
behavioral1
Sample
2913f86ae98afe89c7b6d3c61f37916601bcbd8001fc6508f07a518cad6a56e8.exe
Resource
win7-20220812-en
General
-
Target
2913f86ae98afe89c7b6d3c61f37916601bcbd8001fc6508f07a518cad6a56e8.exe
-
Size
80KB
-
MD5
5858b6634d0df73508946e67be7528db
-
SHA1
4de9803b9cd82a9dfef8ca77c4258c75400056cb
-
SHA256
2913f86ae98afe89c7b6d3c61f37916601bcbd8001fc6508f07a518cad6a56e8
-
SHA512
01ff9d177be1a092c3ba8eed20bb92e11fb1b5ba78c01fce74a997d4eb9ab9203b9adf2ae1efb2ecd4d6a6c201144183a7ffe17803e8ce904b21b68455dfc387
-
SSDEEP
1536:DQaHOa3W95VLGaW9F8ROaA5ELijbcNRzP2:LiGae8RO2Uu
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 1168 msedge.exe 1168 msedge.exe 464 msedge.exe 464 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msedge.exepid process 1100 msedge.exe 1100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2913f86ae98afe89c7b6d3c61f37916601bcbd8001fc6508f07a518cad6a56e8.exemsedge.exemsedge.exedescription pid process target process PID 3672 wrote to memory of 3492 3672 2913f86ae98afe89c7b6d3c61f37916601bcbd8001fc6508f07a518cad6a56e8.exe msedge.exe PID 3672 wrote to memory of 3492 3672 2913f86ae98afe89c7b6d3c61f37916601bcbd8001fc6508f07a518cad6a56e8.exe msedge.exe PID 3672 wrote to memory of 1100 3672 2913f86ae98afe89c7b6d3c61f37916601bcbd8001fc6508f07a518cad6a56e8.exe msedge.exe PID 3672 wrote to memory of 1100 3672 2913f86ae98afe89c7b6d3c61f37916601bcbd8001fc6508f07a518cad6a56e8.exe msedge.exe PID 3492 wrote to memory of 5036 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 5036 3492 msedge.exe msedge.exe PID 1100 wrote to memory of 3124 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 3124 1100 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 3492 wrote to memory of 3852 3492 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe PID 1100 wrote to memory of 4188 1100 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2913f86ae98afe89c7b6d3c61f37916601bcbd8001fc6508f07a518cad6a56e8.exe"C:\Users\Admin\AppData\Local\Temp\2913f86ae98afe89c7b6d3c61f37916601bcbd8001fc6508f07a518cad6a56e8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=2913f86ae98afe89c7b6d3c61f37916601bcbd8001fc6508f07a518cad6a56e8.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffaa4ae46f8,0x7ffaa4ae4708,0x7ffaa4ae47183⤵PID:5036
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,14592569813659810058,10484027943698831312,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:23⤵PID:3852
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,14592569813659810058,10484027943698831312,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=2913f86ae98afe89c7b6d3c61f37916601bcbd8001fc6508f07a518cad6a56e8.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0x40,0x104,0x7ffaa4ae46f8,0x7ffaa4ae4708,0x7ffaa4ae47183⤵PID:3124
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,15019500814862904808,16399008735398652457,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:23⤵PID:4188
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,15019500814862904808,16399008735398652457,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,15019500814862904808,16399008735398652457,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2616 /prefetch:83⤵PID:1816
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15019500814862904808,16399008735398652457,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3776 /prefetch:13⤵PID:3976
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15019500814862904808,16399008735398652457,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3800 /prefetch:13⤵PID:3952
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15019500814862904808,16399008735398652457,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4480 /prefetch:13⤵PID:4728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15019500814862904808,16399008735398652457,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:13⤵PID:4892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15019500814862904808,16399008735398652457,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:13⤵PID:3672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2068,15019500814862904808,16399008735398652457,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4540 /prefetch:83⤵PID:728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15019500814862904808,16399008735398652457,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6528 /prefetch:13⤵PID:1872
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15019500814862904808,16399008735398652457,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3800 /prefetch:13⤵PID:3624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1212
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C0427F5F77D9B3A439FC620EDAAB6177
Filesize471B
MD5cbbbc508522e918d6a2ad024b23ec7db
SHA134cc500544bdd2d6b242236541de026beb61e7e5
SHA25659c75f8d7e07c731797b68ea29d736a3cde590c49ff0c839104e679afffb4593
SHA512f7d820499175b752b20b8bd4002fe0b4062722d60403b4478c788a8025cfcb4e87bb78c37f7309aeb01e982589ef3f3c799e8b2141338db662b14c43bda82e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C0427F5F77D9B3A439FC620EDAAB6177
Filesize412B
MD5c304254548eda5a0aecd2dca40766cd6
SHA15e52ab4743275728c310bed13f83a29ead848b86
SHA256cde79f11f8bdd3c2d05c4ab6c73c614ec9934fd6cb39f956d58f5f9be55f0687
SHA512afe8eebcf88750b6cdacfff87e6010e7011ed31335bee840fd658391e4b1dfb1504a3380d371627fc10a7271354cc13a6354415f33d78e23a5003bb68ab16e68
-
Filesize
152B
MD5af05481b81fdeb6c34b41fa28542b8e1
SHA130982103d4ad165cda1b492f96da553b0d5a8663
SHA25661fabb6e11c5fe6ed58cbe1d1651395b973b7f460ebc78183b02484fad2ef7a2
SHA5126671efa37f6ed5c9faa5b0a063bc6741d2dd217a6bfd578da3d3c8a54b16395916fa2173851bcd597b7489da05fe33095aedc655d0a7df773bd96f814b3b900f
-
Filesize
152B
MD5af05481b81fdeb6c34b41fa28542b8e1
SHA130982103d4ad165cda1b492f96da553b0d5a8663
SHA25661fabb6e11c5fe6ed58cbe1d1651395b973b7f460ebc78183b02484fad2ef7a2
SHA5126671efa37f6ed5c9faa5b0a063bc6741d2dd217a6bfd578da3d3c8a54b16395916fa2173851bcd597b7489da05fe33095aedc655d0a7df773bd96f814b3b900f
-
Filesize
152B
MD5af05481b81fdeb6c34b41fa28542b8e1
SHA130982103d4ad165cda1b492f96da553b0d5a8663
SHA25661fabb6e11c5fe6ed58cbe1d1651395b973b7f460ebc78183b02484fad2ef7a2
SHA5126671efa37f6ed5c9faa5b0a063bc6741d2dd217a6bfd578da3d3c8a54b16395916fa2173851bcd597b7489da05fe33095aedc655d0a7df773bd96f814b3b900f
-
Filesize
152B
MD571b657795f1d63721f304fcf46915016
SHA1d2cabf753a2b8888642a3a26878e7f47784153b2
SHA256f6d95ff8ef0a6098a3c31bedf0f623555cf3855bab0142f2350f07eb85832c28
SHA512dd1d8e6e56463cba11da14b604c4dcedf13e1914c4afab93121f6535a30120e0d907c0129c6eebfc8a0a70a557d2f6d467a24fe0bac960c79519049e1931ea20
-
Filesize
152B
MD571b657795f1d63721f304fcf46915016
SHA1d2cabf753a2b8888642a3a26878e7f47784153b2
SHA256f6d95ff8ef0a6098a3c31bedf0f623555cf3855bab0142f2350f07eb85832c28
SHA512dd1d8e6e56463cba11da14b604c4dcedf13e1914c4afab93121f6535a30120e0d907c0129c6eebfc8a0a70a557d2f6d467a24fe0bac960c79519049e1931ea20
-
Filesize
2KB
MD5811400f8dafdca274a9eaae11f53d797
SHA12e11807cf91d69b85018c805a7c24646bcdb1bb5
SHA256854e964052fefab4f5c825d2ee9b62e80588b4fc66c4c60bb0328b76366e6722
SHA512099a04f7e1a58e5b050136255ef76d0f506a807510ca1bd029acf0acf58a532dc385497b584081b46511bb7dfa77c916bcacba05200001207e85b888c9ec5a28
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e