Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
63ed105d2471fa775043c933d19d2313_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63ed105d2471fa775043c933d19d2313_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63ed105d2471fa775043c933d19d2313_JaffaCakes118.html
-
Size
64KB
-
MD5
63ed105d2471fa775043c933d19d2313
-
SHA1
68b87a6a3732ebf496fc6065edd2d9ec71b6eb8f
-
SHA256
6960a144430980528cf18ed4dc22d0ebab225fd9569f66bf7444b315c72cea15
-
SHA512
dc628b8d30bc6c7d29a0f1a3acfda928b92ba7fcf488f04df10dd9fcc0eeb02442b0dabeafc193df7239245b4f6268c642819c2c3f168d0d32449c0dd027c1df
-
SSDEEP
768:1WgO4WQCwkOE2qO1fwN61ir5NIp0Y8nOyWn31g9f/Zs1PbA:kRUCwkj2v1ocJ0Y8nr0mf/ZGPbA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3656 msedge.exe 3656 msedge.exe 4252 msedge.exe 4252 msedge.exe 2552 identity_helper.exe 2552 identity_helper.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4252 wrote to memory of 764 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 764 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 2616 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3656 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 3656 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe PID 4252 wrote to memory of 5116 4252 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63ed105d2471fa775043c933d19d2313_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d05046f8,0x7ff8d0504708,0x7ff8d05047182⤵PID:764
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,10634050665898321748,16877450300338127728,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:2616
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,10634050665898321748,16877450300338127728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,10634050665898321748,16877450300338127728,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:5116
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10634050665898321748,16877450300338127728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4860
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10634050665898321748,16877450300338127728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:444
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10634050665898321748,16877450300338127728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:1244
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10634050665898321748,16877450300338127728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:4744
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,10634050665898321748,16877450300338127728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵PID:2600
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,10634050665898321748,16877450300338127728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10634050665898321748,16877450300338127728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:3648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10634050665898321748,16877450300338127728,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:4752
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10634050665898321748,16877450300338127728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:3808
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10634050665898321748,16877450300338127728,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4564
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,10634050665898321748,16877450300338127728,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
Filesize
144B
MD5ab603134d67e0170221ac115f24286bf
SHA1564df0b1e2dc09249a2e8bfffae4b977620ad247
SHA25618a6dc4fded174939651d26729c28915013ed7451d26295ebe8987993a2b0520
SHA51250d05943953023ece6f77754370174b158d5f20d90a2a9740c0d2a45e6489cadc3ab44de69b621a7ff1850670bd657899ed8a7b079dc1984b8960ad6a8a687e9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5d1f27e92268d85a69e0fb022e79b49f6
SHA161d99e01288edb30514bdb3d1330862b96a4d666
SHA2569043c4b7eb24086b1a8f0aaa3f704827bf149b87e86d0ccfc1b5885093996e2a
SHA5126435e9c6eef20576dd4beed9ec2bfb4d02460dd0d05160efb630068326f0fdf8437f21faedb55816e94516ac230986f51d40453af1e79e8f025d821293e5555b
-
Filesize
1KB
MD572f4ae0c48910df909898d084d65a3c0
SHA1ee1af20ee72fd6cd5b79ecef00858a6b24e7c3ef
SHA256758ea53beb760bd718abf043530db660095d6a1783f3888a71a5d5a9a15398b4
SHA512f458254a209aaefbd8ccf8533b647d73ec97c54fe7044c41d2595bbdf565352af3d16b5fe6092a4570dac37673c3aa814be7e17f7a5c5c79965cd2f43bc6cbb5
-
Filesize
6KB
MD5ca9823b6c5f571fa8f8e97e3bcfc7840
SHA1606736cc32d2bcbd4eb909aaf50e17362a477678
SHA2562f053503bb0c4e974eb3d6748cc04928f6744b771cd9913014a394ed80e797b6
SHA512c475ff7b03528c5bd3b9e4afec268196a82194a96362a93c57f1426d05995f1d5172cd170f55447728a9729570a14e17abda1f51634406b255d7154d806dd39a
-
Filesize
7KB
MD5bb9b443289d83f11691837b0e5e53d85
SHA15a1620a5c24185ae16306b269f9b42364a4be024
SHA256bac24d143ca9191fa806b025049fdd1f414ea4b4a33b1372c3fd8a5d991b4f95
SHA51206e24e2fe7688ce1460c1f5aad40ae5a868736abeb74e4744ee8f4208de460fe81d4b8747a878574eeebf8823a693a213c23490396ac3260147c57e77d50b1f7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c8267baa-fdfc-462e-a81b-893f5be1d57c.tmp
Filesize5KB
MD5258bdb3118e5dfc2e1c83a1c367f0278
SHA14179fdf43eed8a3c5008c5bf3b6574ccc18ae6a2
SHA256569a1a99d481d56db1790e4058547d63ef2b4a53b612d1268ab8c09ad8724e0b
SHA5126a74e50f4e935fec67183d09f9d18e1e173acc095413bf24970773c15e3305f212928520002dbe63a1066fb299ebe985cef02eb14f2983a21a24cb74d5606db0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a7588c695c1029a0742766db7f2a6d9a
SHA17c99ab34d11dfe2d85752d7b0debd6e244626394
SHA256c295350eeea2323b0befbfffb19e6182444ae993ad302c9d0002dd5144726111
SHA5120bcd553226451c55bdc3c4f778bd8642866aea8673b85a7be5f3b9bc9b043b4b4996c9d192d9938adf2db3cc89ec9e094b1d810844548e277f333b466ce74808
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e