Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 15:40
Static task
static1
Behavioral task
behavioral1
Sample
63d2d89b1f382c1b854b22d5f838ba92_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63d2d89b1f382c1b854b22d5f838ba92_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63d2d89b1f382c1b854b22d5f838ba92_JaffaCakes118.html
-
Size
61KB
-
MD5
63d2d89b1f382c1b854b22d5f838ba92
-
SHA1
1eb66c663bf91a2c550488d0ec47da9df8af7642
-
SHA256
50bc206162fa2344fdd8930ce08804928c7835fc98e6b91501c68560853ace27
-
SHA512
7988319cc33f8e0d9631b66e26467363adf8eb2160caf94573b92cb787c0aec84680f7ba4af0bf42c697e2cc16802a33f93d4e618638b0263ea0a4d2f4b63fe2
-
SSDEEP
1536:nWw9+Ou3x1n90dkxxI9q1qxdF9Sfetx89wxM9exxv9qWgxxk9qCaxxO19qbMxxOY:nWw9duXGdAR1skWcVCmOOb4DUCm1tlob
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4856 msedge.exe 4856 msedge.exe 1424 msedge.exe 1424 msedge.exe 388 identity_helper.exe 388 identity_helper.exe 5952 msedge.exe 5952 msedge.exe 5952 msedge.exe 5952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1424 wrote to memory of 2596 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2596 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 3576 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 4856 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 4856 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 2444 1424 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63d2d89b1f382c1b854b22d5f838ba92_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff54f946f8,0x7fff54f94708,0x7fff54f947182⤵PID:2596
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,7652758049075992352,7614658274070396792,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3576
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,7652758049075992352,7614658274070396792,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,7652758049075992352,7614658274070396792,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2604 /prefetch:82⤵PID:2444
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7652758049075992352,7614658274070396792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1712
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7652758049075992352,7614658274070396792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1924
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7652758049075992352,7614658274070396792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:4880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7652758049075992352,7614658274070396792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:3392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7652758049075992352,7614658274070396792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:2420
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7652758049075992352,7614658274070396792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:4160
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,7652758049075992352,7614658274070396792,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵PID:1616
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,7652758049075992352,7614658274070396792,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7652758049075992352,7614658274070396792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:2592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7652758049075992352,7614658274070396792,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7652758049075992352,7614658274070396792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:4396
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7652758049075992352,7614658274070396792,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:5128
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,7652758049075992352,7614658274070396792,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1596
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD57f938dff0bcf420a8ad315f8282bd837
SHA1ef5aca43f58c5487b51e67fe0afee81d1d54137f
SHA25696f77247955f410faed1fb6ea934609b1aab118283f65a9dc91bed102a72ffec
SHA51251809bcf11e2881a1a1dbcbd6d7c263a4140d96dd8ababf2b823050bca261994d19515bbd50ffca8ecc858057e94828d1e8f7b7803e107650f559717b36b6d60
-
Filesize
417B
MD5d3bb4aadfa2a17804fd63be7fd88200b
SHA1c4dd13a60ff25eae5769384f3460e66ddb6783b3
SHA256454e2a0c7b469df21b3cbe2281f635d4c32db594e0de7a80280a1c0a62f8e474
SHA512a080adbbc1b033103009af4d94b4d88c34c3684380dc1bb08b0c859cf8d70c83a17df04eaaac7e25aef615c0fc8afe608b2695d255d16c02ae8862d82fceb861
-
Filesize
5KB
MD525a76c745685d794ff56d1f110bd7b76
SHA13cc8cc0193e3cd9873292a961f6413fa0698a9b7
SHA256139ac16d6bfbc76083cb5db4f08f9cf856973197bc5b33eb91eb18f3a9ec78c6
SHA5121b2bf082d166bbb6d763e6c22a7626a369f334baaa651ea95db84537311fe17a98ec8fd6762ca97186330f6d22ca35370e22a596517bfbd00e90305c28a050e7
-
Filesize
6KB
MD5814a54e658f2ba0f311030f25c8f40e5
SHA108ea1843d88071f6e1ddbf882cdb6919c6d9bd18
SHA256bfdb0a9ca003d06fb39d5ccc81678126cbb490d431817f346337f717406e2f11
SHA51235c38652c8c71fdb76ee324fb5be6db15c186aca6b6ce38f613c3aa9788dc0694f441939512295b8009d319fa163d831416ce9775abc1f18f356aef928b58ec9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ae97b1e06d19db5301289fefa72c54cd
SHA1fa9f291a20cded08146b07dd5b19c8cbdba31e4b
SHA25603758262498088144a53200eaa6cfc948a900ce2f7dad4a7a4bea64c8884ea44
SHA512283f9daf28bb5287996240f39b5d763e6073a8ba693bbd39c5a7565488781603c59a0332d2ce6b8d2e88c7e0d6dd810d58b8069e33c426c0ea6f257c433d6579
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e