Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:41
Static task
static1
Behavioral task
behavioral1
Sample
65bb21d851ad9373534d2eb82759f5fa_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65bb21d851ad9373534d2eb82759f5fa_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65bb21d851ad9373534d2eb82759f5fa_JaffaCakes118.html
-
Size
10KB
-
MD5
65bb21d851ad9373534d2eb82759f5fa
-
SHA1
e422892dae0503da37836382aeb0f8f673d2cbf8
-
SHA256
8508f8f780a9e2fad945cdc3f2e99edfede5cd8bb8e0e8cf3282be16126a2fb1
-
SHA512
f8a228453f110f20a97f65e61c217ed7859e8aa05a07fb27045fcdb2ab5d9f2175e89d2b782b8093da57ff3a815aaa7e5e7019866dd28854994761889baaaa94
-
SSDEEP
192:CfuNfy66cljL9Tnxfw+tGV7N9x//gx+Vd/DPdafmrgWeAcAvD:Cmhy6bL9V3GJN9xXgx+Vd/rdAWeAcAL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1337824034-2731376981-3755436523-1000\{9BB7CBD0-E85A-4432-A832-FE032902D100} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
msedge.exemsedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1896 msedge.exe 1896 msedge.exe 3764 msedge.exe 3764 msedge.exe 2480 msedge.exe 2480 msedge.exe 3752 identity_helper.exe 3752 identity_helper.exe 5500 msedge.exe 5500 msedge.exe 5500 msedge.exe 5500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3764 wrote to memory of 372 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 372 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 3084 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 1896 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 1896 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe PID 3764 wrote to memory of 4900 3764 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65bb21d851ad9373534d2eb82759f5fa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa05d646f8,0x7ffa05d64708,0x7ffa05d647182⤵PID:372
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15859212941351375781,8134255381858824976,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3084
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,15859212941351375781,8134255381858824976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,15859212941351375781,8134255381858824976,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:4900
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15859212941351375781,8134255381858824976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2000
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15859212941351375781,8134255381858824976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1268
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2116,15859212941351375781,8134255381858824976,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:2372
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2116,15859212941351375781,8134255381858824976,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5308 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15859212941351375781,8134255381858824976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵PID:2900
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15859212941351375781,8134255381858824976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15859212941351375781,8134255381858824976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:4588
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15859212941351375781,8134255381858824976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4128
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15859212941351375781,8134255381858824976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:2092
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15859212941351375781,8134255381858824976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:1068
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15859212941351375781,8134255381858824976,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2300 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
673B
MD53ac93dbbceef0d3bc1a3c426771463ca
SHA180d242539d0893888912d636c8c5cad2666772d5
SHA25640d9d5aa9d78a226dd31e3fec99501f614cdebc597473ab4457a75b911b36c28
SHA51253fb0eec58f7216de6a099566d8fb07939b93c423bc09b6a5f3bf477405631e7b1872f8410917e92edad51cb66e3843da1cd8801c54b0fafeade760b768a9c60
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD59adde3ba8875c15b6b0b8bbb47f36e47
SHA1cdbe68f2463a429f57af9544050a742b62f58189
SHA256689bcfcbdff8394db04fb98946bff67e8d6ec992873c18604818260cf0f72d5c
SHA512404b95ac48cbc46d8c53bdeb861f5b4e4f47feab69e612f7afb26c3242fe58ffc5646eeae8e13f4d9b61a763a7bd47f1f0db550c9bed2b0c1ac0cdd2529c2d2f
-
Filesize
6KB
MD5e02862181963f74b04a2c6322cc7f450
SHA15f7d9c07f9727c5e9d0916e1e2c39e237f9eda28
SHA2568d3454dca9b6309f289f294296f0bf95e69d4626d0f23f56f0a2b4ba5c4eb33e
SHA512d0da4e1d2c1c5aaf63831840d89172c36ec42b3b3aa55841a7fdadf93ec1ffa1d1204e1ee2838b73a0c927b78ae18807d11a036beb8620c21787675c7e6931b9
-
Filesize
6KB
MD5e5d03103472f5aed12917a160cd50a06
SHA162998ca57b69f129cabfb9f40cf4a46e17793799
SHA256293fe1bc078f990eb46054b2109e511a735bf3ba50ab462d6ec5de79972c9904
SHA5125fe9090359a12a648bc3984c8fad656b576fd458555d665785f1a34eeec9a4c2d4dd728db461b0208fce05f8b4a5ea49f5c18f81c217d2e04fdd49e065fe2bd3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD555926ad7bb71e16592d20629737b08d5
SHA1491e1fca8c738c91b029838cec9c67badf673473
SHA25643e73ac9a6a837d66d4bc46c6d6a83f5e0564da701bacf8de2c771e7ff4f7f4c
SHA512880fea8f59916cf69850515e6b05021ee4efc535e117114b77df3f39434120deb779313e928a9d03707388289f7da669e4637e748eac5bc91298397536ab91bd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e