Analysis
-
max time kernel
135s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 13:11
Static task
static1
Behavioral task
behavioral1
Sample
2f456680be64ed75be386dcac3112d0b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2f456680be64ed75be386dcac3112d0b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2f456680be64ed75be386dcac3112d0b_JaffaCakes118.html
-
Size
225KB
-
MD5
2f456680be64ed75be386dcac3112d0b
-
SHA1
d07ff483373c2d59c131c46c97914e058ee485bf
-
SHA256
6215feaa02b7aa75e7a549fa634720369a011ed8e2083836a538413f22fe462d
-
SHA512
637f7cb5f679218a8a57dd71848b359b506e5001e23b2d94b173922571b11ba332a17ed8cead799e703cb5d3d4ff406571d184943228a1c9399ee51d55d52ef2
-
SSDEEP
3072:h69C6mreaxKY40wZAQKwb9Q5blc7fWMOxe+xlOlDJju2Jr:h69myaxKY4069XoCR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2572 msedge.exe 2572 msedge.exe 1008 msedge.exe 1008 msedge.exe 372 identity_helper.exe 372 identity_helper.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1008 wrote to memory of 1580 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1580 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1196 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 2572 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 2572 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe PID 1008 wrote to memory of 1316 1008 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2f456680be64ed75be386dcac3112d0b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcca3d46f8,0x7ffcca3d4708,0x7ffcca3d47182⤵PID:1580
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,10922464245526700424,777482348955412016,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1196
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,10922464245526700424,777482348955412016,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,10922464245526700424,777482348955412016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:1316
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10922464245526700424,777482348955412016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4132
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10922464245526700424,777482348955412016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2184
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10922464245526700424,777482348955412016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:2576
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,10922464245526700424,777482348955412016,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:82⤵PID:3608
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,10922464245526700424,777482348955412016,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10922464245526700424,777482348955412016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:4080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10922464245526700424,777482348955412016,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:1096
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10922464245526700424,777482348955412016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:1600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10922464245526700424,777482348955412016,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:3652
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,10922464245526700424,777482348955412016,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3476
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5b2a885339f124e63944eb015458c4866
SHA10e30b69fa67fb1a26c29ce75431750bf024ef320
SHA256d7bb8d01e6619c7769f7b45c52044114696bfa1698f752426894e7c07c7e56f3
SHA512ff8f02add5e3f264d26cb7f9042e2e6d28378a081e0daf46a094ecbc6f6bc1b9f723e9c441f52aab804ae7851f50867f8cbed50fb19459ca7b7adc728964200a
-
Filesize
2KB
MD5eba4659be6ff0464eb260cdf2d6e2b67
SHA1851fdae3418ccb03ed10a2730c9a20dfd27176f8
SHA2560f6426473be469078661925b8041512a77549fbbb79c55d006e6e2f302aeb0b1
SHA5123b2aba68e249b6a2e49a59a78362f57a5bfbe40a212c22f5ec5ac65c3b61f1451031cadd7d573ce775f7e4497f11fa6c153f5a36d5927ec66f055ee727be392f
-
Filesize
7KB
MD58026039b6d8bf9df227aeb13b5fd51fd
SHA11c4e1fbcab74c52f4d9f2d9eaf3638e8ea34f99b
SHA2567c834d0bd72776ffcb3f5388d56f811c5a2ae26ba6060c2ec8026a9f497f6872
SHA512bf3fbb0613a74d57785c0022d2b92ddeed14ca363c32f5f04fca9ac1175091fdda228ea2e26ccc5c912cf33292d1b8771ec0607403b1af35c788a0fcce235e10
-
Filesize
6KB
MD53715a5af9481295b18a9ab7c3e4fb9b5
SHA15316f4c569f73aeb54658f2482247fb53b0688af
SHA25653f943a5e3d43ac9d7fa6bb8919605cac66b9bfe9406b79f6a1793507f85f941
SHA512c42d1e613a17e3dc86fe9764eee88952c87c54d7cfd8fce98adfc3d362aa2f2f7ead478c3f98f69a0db9966e5f8d1b2174956f7be08575904278b2af3a6d5190
-
Filesize
7KB
MD5a39ff3dea54dbd3471f39b47a974e8dc
SHA178f79e6d271ed17f55734b8e856545a65f6447af
SHA2560a7844a0f4dd056c892ebd8d8783ba44e80ea24ba0d906ac99c1717b90ffc9e2
SHA512b9d2683a63ed5bf82fa3f358c37bc777425d45435911111987c9c4f15cc5f1c6510353fde48fb722587d166f4273ee8c6698cd3c3356e1614fc4273d08896174
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD59feff8659e8440db3329dc185ab00e43
SHA16b29208c43bfe66d1c7fa366e888f0acdec97444
SHA2566f981fe820655b225182e00e1242a9e83ff44dfb8d05bf2fe93a1838680ef34e
SHA5128fb1c3550fb82aa99742425e790a8f0ddfa1cd3397d8b8ef7b8f8c66b7149815f19e9193e18cdd20809f3466b917e00b6e0909222ce0a715ad97067cd01b574c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e