Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 16:37
Static task
static1
Behavioral task
behavioral1
Sample
63fd5d65b451a588b652b392e69aecb4_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
63fd5d65b451a588b652b392e69aecb4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63fd5d65b451a588b652b392e69aecb4_JaffaCakes118.html
-
Size
175KB
-
MD5
63fd5d65b451a588b652b392e69aecb4
-
SHA1
b7a704efd607cd649a11a2ce5c450c0f28babb1f
-
SHA256
46c2ab36c7a15de99e99a1c6ef118f1a0335f1050d2e38c33155cd4265063e1b
-
SHA512
8d51716b335743ab5055dc4870512583dc1273d0b5a79733eaa6e656919bab936be8bf04a8d4e95fe22e4e537d8698c967bba81cad40547464dc6fbd44983606
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS3rGNkF+YfBCJisk+aeTH+WK/Lf1/hmnVSV:S4oT3r/FXBCJi2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 116 msedge.exe 116 msedge.exe 212 msedge.exe 212 msedge.exe 2976 identity_helper.exe 2976 identity_helper.exe 3860 msedge.exe 3860 msedge.exe 3860 msedge.exe 3860 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 212 wrote to memory of 4484 212 msedge.exe msedge.exe PID 212 wrote to memory of 4484 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 1628 212 msedge.exe msedge.exe PID 212 wrote to memory of 116 212 msedge.exe msedge.exe PID 212 wrote to memory of 116 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe PID 212 wrote to memory of 432 212 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63fd5d65b451a588b652b392e69aecb4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd711f46f8,0x7ffd711f4708,0x7ffd711f47182⤵PID:4484
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,2360890092023734023,14025431734032680589,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1628
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,2360890092023734023,14025431734032680589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,2360890092023734023,14025431734032680589,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:432
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2360890092023734023,14025431734032680589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2720
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2360890092023734023,14025431734032680589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:692
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2360890092023734023,14025431734032680589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:1520
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2360890092023734023,14025431734032680589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:2064
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2360890092023734023,14025431734032680589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:964
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2360890092023734023,14025431734032680589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:4840
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,2360890092023734023,14025431734032680589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:1488
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,2360890092023734023,14025431734032680589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2360890092023734023,14025431734032680589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:1368
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2360890092023734023,14025431734032680589,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:3592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2360890092023734023,14025431734032680589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:4552
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2360890092023734023,14025431734032680589,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:3416
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,2360890092023734023,14025431734032680589,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3200 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5cdfdcd9ef30d2ebd6d92a6c77024e362
SHA16d373b27239935205a6e415c4658163e8154edff
SHA256b8f7b1d596ff09d3784eb1e921bd06ce15cfc6ca90052c2cd0d1898f455f0f9e
SHA5124ad766197d8bc154a63ff209c12034d732c166d8bb3d3270d054f08e0011c1ea5aee595450d571a395f629218e73b553d3f55119537c4c9cc5f97e1e595117ad
-
Filesize
2KB
MD5f4995ddc262f35a8bea7724447aa2219
SHA1cc92bb23f8cf02841041438f927de88c4235179b
SHA2563981147343f03328094d662d4b0065124cafcdb597526460f02c194c6d195d88
SHA5128e6d57f4f5e58236246dbdf2b2977b60d0158d34e64c295b6732b8e83f838713c05d23ed1957a2b536f8d476d56bf5f3a44d12ea22d0c84dc13c79c457b156ae
-
Filesize
2KB
MD5ae1e626dacbcfcc706f7278e0a9fcb57
SHA1c30e86ee5816aa87d02466068b32337d5c82ce32
SHA2563ca60b2e5d06507b6c40cc18fffffe47e5f4dafdefe7fc87d01f56f16b9dd1ff
SHA51281f79b187d6a4ef30ee6afd74aa01650d0c8c0c41dfc7d01759f289c29b2dda87f7b39e82b4583ebb674a387653f21d5ffbba4692c13fc352ed6a5ca7d608265
-
Filesize
5KB
MD51e25d17e6f83394d6b7cd51526f4519f
SHA13552c7b8542ca965c21d6c5aab8cf99554487645
SHA2565e3281fbcbc1c1bf699787f8396766ec26edd5b59cfdfe91d6fad86bd3139036
SHA51259eeb4cce52b733496f4a065be10e38a0e8859cdab315aea754e31cc6e77e45910193cde5bbfcbc0fe4fddd169c6842ba275b9111afb81ed75b3202bbb04fb9e
-
Filesize
7KB
MD58428ef9a82586e5bfed87a3a586dd84e
SHA1a6a6f71c182eb449c21bea56c7819f6ecc244628
SHA256262bcfd531d448ce87ab27f80b324749fb4f858f6a607d21bad2365833500a06
SHA512a17bef7c8069321a82437524d8aaa4c08757d473af42dfae9c3fb5078470e186acfc2bace3ab0532280972894803cf068b607f8c52413d21f042d88d3c8d30d4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56d6be374211eedfde2bc709c48bc6b09
SHA14f8d7661bea515e278546fe090b1c58dcd4578ad
SHA256cbc242685acf3cbb9b066ce502932bc2bbd04fd1ea6cfaf6e669fc2d9fb81bd3
SHA512b5b4dbddac8b8556d489528c02e78d5a7958f245854f154859b59b61a629736d39cd52713bac8d8db3280b5eabf3c6ad0c08ba873b4105dd04805987cb8e7b49
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e