Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
693a25ce08d641d39f57efcfe315d1e5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
693a25ce08d641d39f57efcfe315d1e5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
693a25ce08d641d39f57efcfe315d1e5_JaffaCakes118.html
-
Size
175KB
-
MD5
693a25ce08d641d39f57efcfe315d1e5
-
SHA1
516e01ef21f431caaff8a3c97f6e2a79d6ae4d72
-
SHA256
a27e210042599ec342a4b388e287ef4ad35eb3f6accfef9572d7db8748653d66
-
SHA512
04a13945677bfa777df34bce485a4e77aede03a71f66d24dfbe9bac1f0373029e525557972199c0e8b7b3604e4ba812f15c6bd8c1445e8b3cbf5d803b9b7e526
-
SSDEEP
1536:Sqt58hd8Wu8pI8Cd8hd8dQg0H//3oS3hGNkFUYfBCJisR+aeTH+WK/Lf1/hmnVSV:SOoT3h/FBBCJidm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3300 msedge.exe 3300 msedge.exe 920 msedge.exe 920 msedge.exe 3524 identity_helper.exe 3524 identity_helper.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 920 wrote to memory of 3612 920 msedge.exe msedge.exe PID 920 wrote to memory of 3612 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3920 920 msedge.exe msedge.exe PID 920 wrote to memory of 3300 920 msedge.exe msedge.exe PID 920 wrote to memory of 3300 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe PID 920 wrote to memory of 4116 920 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\693a25ce08d641d39f57efcfe315d1e5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9903a46f8,0x7ff9903a4708,0x7ff9903a47182⤵PID:3612
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,779575490799476193,5458300192931619298,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,779575490799476193,5458300192931619298,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3300 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,779575490799476193,5458300192931619298,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4116
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,779575490799476193,5458300192931619298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,779575490799476193,5458300192931619298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,779575490799476193,5458300192931619298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:4612
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,779575490799476193,5458300192931619298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:1460
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,779575490799476193,5458300192931619298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:3420
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,779575490799476193,5458300192931619298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:3680
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,779575490799476193,5458300192931619298,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵PID:1052
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,779575490799476193,5458300192931619298,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,779575490799476193,5458300192931619298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:4584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,779575490799476193,5458300192931619298,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:2044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,779575490799476193,5458300192931619298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:4408
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,779575490799476193,5458300192931619298,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:3864
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,779575490799476193,5458300192931619298,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD51375f51fa98ff029c7115b6608ebdbb3
SHA1257158992d37e740f5cf72d890ec9182e92066d3
SHA256de9d6a635e7f11bb306830896ecd985465ce179bcbd504158e785155fb5ecdb3
SHA512a9028f473014816423797f4afb516aca74d7f7fd4144a95036705c76f152bd14e3f82d9095608063a9f1954f83e6cbeb00997ec028551e16ccbba69ebb02ddc6
-
Filesize
2KB
MD5f1ba9cf624dbe03dc839ab6b866effdb
SHA104ddf394644125a98b4244b0afbd71c9d7626913
SHA2566035d290d64095ce6b6f77cde4afb1480abb7c230ba957f4decae4d2630ddd00
SHA512605eb9c345e7dee189395b5826cce3507d06b239351c5b318cf7c6bb541c2d339e5d5c33915138f8b344235701c26b194a2c2b12890e89b81c817edda834019c
-
Filesize
2KB
MD5c2cd9522ee393ead80d45d93d313460d
SHA1db547a6b2e731d7656caebbe5510026c4edea3e6
SHA256e839fcc10950c0233b234db7b43e7e3426fa2557fae50db062ba273a157343ac
SHA5121b55623fd1210431cde155656bfc65dee97b8b726435fd10d6d6c1cd64b9eef00155e6a5e8970c3192461564b5beb71b363b505b521fd1ac082680f3f1fe7470
-
Filesize
5KB
MD5eea76b60c4fb089d9de3a06376fc8632
SHA1064805ef4215eac226b6b683c8661be33144f2b8
SHA25660dd2b09c1acc3a2161e57b23e75b1098346078b1488aa3e0a276f36e3ab683f
SHA512c8d2c892d59813d0a14a97e4d558a67ca9bd5a4d58fa73d44194cf47e9509cec506fb2c8d07c904e5da63a14b74575c153a2b1d335e9acdcfa082209e82595d7
-
Filesize
7KB
MD55b5bbd751128b22e83abeae2846fbaf0
SHA185757a1aaa86600a23228cb22f98b213f39f23f3
SHA25625d3c2b201bdf85b5952d6a6dac9d45c666c72496cd1ac2a437f0f8d60ac5945
SHA51209082c36c9471955e80f0cc639d5b5a0ab128af79eb5efecd892de3943ac2a8849af9c34a8e915c95fbd813cf8048499b99e9d2754e7a575c23d87d81e3ff9a6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58b0636c4ed63de99d943275870f9683d
SHA13554554d84cf9132d2ba7d702afbcd1022a2379c
SHA256866566c2ba209e1f6c2270301dcfc59dbeedf6f2bf7dfcdce367d8b5ff70d1c9
SHA5126863f1af5a4dbffae98be2f3a8a34860563764d33ae2e3ac9994e305226f1989c56ad538fd1f4b67429370f4dd69b92ddb94c1f8946290d1963325cce0bf67d0
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e