Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:44
Static task
static1
Behavioral task
behavioral1
Sample
65e47e3617f1b3cf5b87df3753d94c7b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65e47e3617f1b3cf5b87df3753d94c7b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65e47e3617f1b3cf5b87df3753d94c7b_JaffaCakes118.html
-
Size
199KB
-
MD5
65e47e3617f1b3cf5b87df3753d94c7b
-
SHA1
a264fe7cfd0fe45d1bb618d781539bcf91408fa6
-
SHA256
c3a86282b26a4ee57f9f3b6a577051e736f2d4c0842530de29ce4d96a019a41d
-
SHA512
383ea37665ee9830db3310d01e8dfcb28e3c1725cde00bb9c09be6887384c6d711c040f15aca48def47235c14c09a16b42a8cf651b3a9038980900da481f28b8
-
SSDEEP
3072:yy3IQz1TuQ7gD48ntOmfCoRguC8zIh3BMIJpGo4kDjX7hd1/10BKanfa3gSQ3rBj:+ntKoR48zIh3BMIJL1s
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1904 msedge.exe 1904 msedge.exe 1456 msedge.exe 1456 msedge.exe 1088 identity_helper.exe 1088 identity_helper.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
Processes:
msedge.exepid process 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1456 wrote to memory of 1176 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 1176 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 4788 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 1904 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 1904 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe PID 1456 wrote to memory of 2280 1456 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65e47e3617f1b3cf5b87df3753d94c7b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ff96de446f8,0x7ff96de44708,0x7ff96de447182⤵PID:1176
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,4811229494492799160,13037526551331194260,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4788
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,4811229494492799160,13037526551331194260,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,4811229494492799160,13037526551331194260,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:2280
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4811229494492799160,13037526551331194260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4811229494492799160,13037526551331194260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:2232
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4811229494492799160,13037526551331194260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:2724
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4811229494492799160,13037526551331194260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:3880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4811229494492799160,13037526551331194260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:2484
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,4811229494492799160,13037526551331194260,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4284 /prefetch:82⤵PID:652
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,4811229494492799160,13037526551331194260,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4284 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4811229494492799160,13037526551331194260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3804 /prefetch:12⤵PID:1464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4811229494492799160,13037526551331194260,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1768
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4811229494492799160,13037526551331194260,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:2984
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4811229494492799160,13037526551331194260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:5596
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4811229494492799160,13037526551331194260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2972 /prefetch:12⤵PID:1728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4811229494492799160,13037526551331194260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3836 /prefetch:12⤵PID:5904
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,4811229494492799160,13037526551331194260,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
387B
MD5e4f3b3198b51936f92c18e3ace512175
SHA18c2ef58e0057b89bb5e4dc515a6894b275bb922e
SHA256d350bb2c7a43437a921cf7f30702ac9f3033c97625118da8824c122f9f9f369e
SHA512b54f0222e9f6d6d0e612eff56faf21f65bd4d8fb96cbc313329684c6163c26cb54851941a382f1a0dfa54e7b35910ef7ba7ef635211e8afc79e5eb0c775cfdd3
-
Filesize
5KB
MD56749b3a53635001b0912ebb332f49041
SHA1b868c225a8b9f1bb6993650985bb0ef9aa2e6851
SHA256c8d0d8ac4b9eec4fc7969ce3031ae07c83eab072475ac2cc1de9d9636d9b963c
SHA512cf8684e4f2fd96e57746075186134689af2e5c583155f3c56a090a8d8127666791a68392cd63967780d929680f1ae19bca833d39566f46402d4b0407d51ec97d
-
Filesize
6KB
MD587ba85826ec48ab9c8ceeb9cae552372
SHA107a77c3396cd093633d5bba83144f9dd1250ecea
SHA256c06a3a617cae1ce1ee71243d08962b177a1c60998d74bffa3be6fae8bac3777c
SHA5125acecdca9f18b48619f5b4280ec33159a276f3da94d0df8eaa565f9a8a96cad8893cdda497939e4bd423ac71a1c73a02efbcf74cb0f1ab06bfe4b0325b809013
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cf303eba17464fa9f1280cd0da196019
SHA1dfe953bff9920ad6eba6ef0120f03722c841cf29
SHA256624bd4d470ed4a05f9b078d7f57a601b9f94f9203e4b01dcdec54d141783a0d4
SHA512f36fc184f9c8f4a4d720cee6fba2050a27c3b725aef74d97f59a82bcd6fc1a63326bc19525d32dadf05edafd5836a6e5a67ec8f27415784dc9d89fec4e0d7ad4
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e