Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 04:11
Static task
static1
Behavioral task
behavioral1
Sample
c45534749ed4c4cc20112e20758f9076_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c45534749ed4c4cc20112e20758f9076_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c45534749ed4c4cc20112e20758f9076_JaffaCakes118.html
-
Size
142KB
-
MD5
c45534749ed4c4cc20112e20758f9076
-
SHA1
b613bfd875d9d86611f2a09d0e7826e3cf6b9d3c
-
SHA256
7373fc0404631b3311482fa66d02baaa99d5b93ca7191c463a3ef3586c987ea8
-
SHA512
cfd9ac837463aa23b8c3689b69ca0ed18fc432d521492d877bb3d98d879def468cd9f4967c2e51892ce55bc3ea71ae9377ac5e10e32388bc5a5b61967b1b5c25
-
SSDEEP
3072:MZ1kclZMa4+hJSJjZ5beLbGXUSiKWYuOFmeBv5aEbwHeZ:EkclzyR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1464 msedge.exe 1464 msedge.exe 1196 msedge.exe 1196 msedge.exe 2420 identity_helper.exe 2420 identity_helper.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1196 wrote to memory of 1180 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1180 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 392 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1464 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1464 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe PID 1196 wrote to memory of 1588 1196 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c45534749ed4c4cc20112e20758f9076_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bcad46f8,0x7ff8bcad4708,0x7ff8bcad47182⤵PID:1180
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,17468066670179294160,2019323052106600493,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,17468066670179294160,2019323052106600493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,17468066670179294160,2019323052106600493,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:1588
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17468066670179294160,2019323052106600493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:3560
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17468066670179294160,2019323052106600493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4964
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17468066670179294160,2019323052106600493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:3844
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17468066670179294160,2019323052106600493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:2144
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,17468066670179294160,2019323052106600493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵PID:2840
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,17468066670179294160,2019323052106600493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17468066670179294160,2019323052106600493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:2780
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17468066670179294160,2019323052106600493,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:316
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17468066670179294160,2019323052106600493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:2520
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17468066670179294160,2019323052106600493,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:12⤵PID:5052
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,17468066670179294160,2019323052106600493,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3636
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5b799399e2287025292fa09c35d826b39
SHA10f1010e5046de646e4964c59f8999c9a47e6fce4
SHA2562ab118447d9bb72359da49007992be01e452d42ce14e878616a289f413f03877
SHA512076aa203bd7277b6a4fa1ad39ade73f05e9ed445a8192e03a0fe59f36f9b7b6effc5109d01ae8f84200a4600565b6da2e87441d4a932f8152a8e770350620579
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD5836b2517181b4b3ef2aef7fcd87ab533
SHA17296325febf7c4a42b386a5eaf094b112e37de0a
SHA256fe1881f27e9e3c0649032cdc323d32f40dfe1eef1a190178c8070a1ef2348a5e
SHA5123e53710e03c490510e187097d9c3b879b78b0d624493d1c82a8b7132afd0a09e8373a37bb4df30ef6ebe807344d60c63d794738bc9aef7b587ecaecaab4174bd
-
Filesize
2KB
MD55561d2226ed1419f21f60bfac389ffed
SHA183ffabb82df1dcb871b72b7db0529d220e1ab451
SHA256050819b49a854321471da6d594f67914066433d94d030171efc5bd6d51778015
SHA5122a8cb05a6cf6fb489fb3419ba5e73d88e857ef6024abbeb3ee38e8984d4a091d29d370daf606f02429bce3aadb96465ac3ee73c225e56c5f5c04965df1513462
-
Filesize
5KB
MD5baf31c25f7fc9cf1dcb5971d7ba4554b
SHA1100772014129c2fa613ed1fd161f17225957f2b0
SHA256f91ae2a7e4e5146a7875e0719e48292296a00d23970244fb049640a26d52be1e
SHA512a360ec854d24b19bf53892a34735fddecdb61ac02d18557227710342fdc8f7a688f040448bba1d8cbec4b6425ab8b2573f6dfce05883294c550cd4851413f546
-
Filesize
7KB
MD54ad3b02a58e914ddc29888db4ecdd4a0
SHA1f9ff91e0a061ac634d5978a07eb6f87ca7e6b1b6
SHA2564ed1e44ec0fbcb1c21bbcc40bba9f2eaf031fc8bf2afa4a6b963b87aabc42463
SHA51202ad4c681db850b63622ab39edfbefc5ae8f975d77e2c1396b9f3bb1b80fb05f38c110b291b6f7705c9e1c5f7a89c2492f91b5fcc378c2907ed1eb0f472e3762
-
Filesize
6KB
MD5666f5bacb35f76dd1f7428c48c09fd33
SHA118885022d159ec0c37b625a6b00838e05e2d85b4
SHA25660ca50ca77a82de354395cad03b34dd6edf9912bc06c731420f1bf24059e2af5
SHA5128237e982e4e76b0308f251565f5d5c3a4fa6dafd9172c12474a9de10dfd8f4a7b201d7e755c28403689a386b82473ecd15b50279494c3072dc4a504b64ccb03a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5db5a89f98113649f3c2667b936413edb
SHA18e6f496e23da6ea2476ba03a2c1e501317df0602
SHA2560b29e304d803cf09a92809d47f1039a9eb9db8f61a634fc60e921755e478f1e7
SHA5126ee36f824ccdb8e42151b388d47dd8a10b14447de08f1850f5dbaad43df391009e66faede473ed2b9dc828926623f4d56d35bb098f9365332691be23161ebfdb
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e