Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:17
Static task
static1
Behavioral task
behavioral1
Sample
68f957fa47f9d67e0bb26259d7eec6e5_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
68f957fa47f9d67e0bb26259d7eec6e5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68f957fa47f9d67e0bb26259d7eec6e5_JaffaCakes118.html
-
Size
11KB
-
MD5
68f957fa47f9d67e0bb26259d7eec6e5
-
SHA1
5bd5c786a725fa1e71f59c15f35cf3c6c3a3d9e7
-
SHA256
baa66595e644b0c5991c70050151260f5dd825fcf7ec84a9bb69062428ae67e5
-
SHA512
60b22e04752b2cbdab15334cf98528afd87c777c1a5be501d7d24a7a6b2b8b89b7ec5de315a054f39eb3c133e5b71547a9dce34e8bc0c890c9ca02abedf0ec39
-
SSDEEP
192:6S7xu0JxJ0Vk0+N/d3A0A1huVxJu5+AtFp2b0OyA89LADSjvZHdWh8KCWvnUCq9v:PxuwGV9Gd3xihIbu5+AtFp2wF9LLDds+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 744 msedge.exe 744 msedge.exe 2676 msedge.exe 2676 msedge.exe 1628 identity_helper.exe 1628 identity_helper.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2676 wrote to memory of 60 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 60 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4244 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 744 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 744 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4888 2676 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68f957fa47f9d67e0bb26259d7eec6e5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8c3c46f8,0x7fff8c3c4708,0x7fff8c3c47182⤵PID:60
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,16635100791471597859,14565456006208450014,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4244
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,16635100791471597859,14565456006208450014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,16635100791471597859,14565456006208450014,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:4888
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16635100791471597859,14565456006208450014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16635100791471597859,14565456006208450014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2312
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16635100791471597859,14565456006208450014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:4816
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16635100791471597859,14565456006208450014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:3000
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16635100791471597859,14565456006208450014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:3504
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16635100791471597859,14565456006208450014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:5032
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,16635100791471597859,14565456006208450014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5828 /prefetch:82⤵PID:2824
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,16635100791471597859,14565456006208450014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5828 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16635100791471597859,14565456006208450014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:1668
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16635100791471597859,14565456006208450014,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6152 /prefetch:12⤵PID:3252
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16635100791471597859,14565456006208450014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:5476
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16635100791471597859,14565456006208450014,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6272 /prefetch:12⤵PID:5484
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,16635100791471597859,14565456006208450014,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1324
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD50896484ef59a501eace26404ad708ea5
SHA1f3aed9c76cd4509971e4a22389cf80d566e12be8
SHA2568d990d093acd3834b8a9e5c8c8b43b98ec9217d4a1ac771515e4f840bae4a28b
SHA512a9ad8203cdc4f43fabc8b971afaafee54bab0a2c680a99e9d812f66ca75621657eda6079577c152b7530fee42bfbf44cfbaaf06f10f1baf5fcddf010f5e03dc2
-
Filesize
1KB
MD5d7c858bfa76940f5f04c1ccb3e8034f7
SHA13ce0a769b15591e74dfffd206cd848c28e12a372
SHA256ccea3775b6631513505a5f238860c8da12cc3d8973d224e927fc50885c1cff76
SHA5125ba42d338701928b201c0bcb74328078c6fedf921bf8c498d5da516ccb751637256bb764b807ce5c2ca15c85dd49312dd91814b2e0b2072d8ff0deb50573cd8a
-
Filesize
5KB
MD56eb879d2656b06a3e7af97a052e3a443
SHA1e782ba7afd245a97f44e1dfe83bf285771ee4624
SHA2566c29de8b01c13d5ba510c8eb58d92f071f6a8c7d8d16a2de31cc17e05e302c70
SHA512c8e26247a1e917a4c7f666dcf02664963615ee1f6507ee9eb90c02ff84671dd17165378cd0fa2c923ae2695c21aad78fde3842e1b69cb8eaab2232197798ff9b
-
Filesize
7KB
MD5a0d65c65d1ab995270933c1bea36c7f2
SHA1d89c27a629eeb3943fcadccc4cb32f226242ac9b
SHA256a3ff12c90c63a385749007611c5951f5a1cf6113547813c69c459b5d837f3927
SHA5122fabffe78d5cc4082302e05615890cc194077339e5547a1f6f8c138b395062bdcd810a8c8d937b80eba06b227a95957eefbf5f6215c8d56ea843f22eff5d8d2d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54ae148ae9442dc91301e123e5fea403e
SHA1a22f8941f30d0662d6b53753308065a84a9109ed
SHA2562c142a03fdf4be6c7bd4cd8b160677cf49023e2eadf75470e95b303455e45ea4
SHA5129a247048dfc1d6e8f8e17bb62a0134060283c337cb050968b160c7e7258d1d94e9a1e95d95bbb1372413e4df8d849feb5da8b2e88475b6f7dfc21d3e5021be87
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e