Analysis
-
max time kernel
299s -
max time network
290s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 17:51
Static task
static1
Behavioral task
behavioral1
Sample
email-html-1.html
Resource
win10v2004-20231215-en
General
-
Target
email-html-1.html
-
Size
6KB
-
MD5
b886cfa4aa6d2d8fe3b14270a28f6949
-
SHA1
76bbc73af57ce1b636ebd2757aab4dba8589aede
-
SHA256
7442521c514eb8476337786c8c32f5d465ff07e1896aaaa58e0e5d1f892b0ffc
-
SHA512
a4ed90e0ce3246973c63ed5b0e436d975d9646429b73378756404d5421b28fb33c8e05fdcd97f60ee0b3f87a3a958b9013c22e60ee556c3e79bed281890dd3c9
-
SSDEEP
96:qQEjgL9/KxpZbCV/lHWohVHUXMA5C3zCePoIasCVr:WatKV+V/AQHUX4CeRasC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133522338813448852" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
chrome.exechrome.exepid process 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2964 chrome.exe 2964 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe Token: SeShutdownPrivilege 2856 chrome.exe Token: SeCreatePagefilePrivilege 2856 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe 2856 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2856 wrote to memory of 2936 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 2936 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 4300 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1228 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1228 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe PID 2856 wrote to memory of 1220 2856 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\email-html-1.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef89d9758,0x7ffef89d9768,0x7ffef89d97782⤵PID:2936
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1892,i,12503837702778892433,12149725401389639233,131072 /prefetch:22⤵PID:4300
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1892,i,12503837702778892433,12149725401389639233,131072 /prefetch:82⤵PID:1220
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1892,i,12503837702778892433,12149725401389639233,131072 /prefetch:82⤵PID:1228
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1892,i,12503837702778892433,12149725401389639233,131072 /prefetch:12⤵PID:216
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3096 --field-trial-handle=1892,i,12503837702778892433,12149725401389639233,131072 /prefetch:12⤵PID:1476
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1892,i,12503837702778892433,12149725401389639233,131072 /prefetch:82⤵PID:4808
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1892,i,12503837702778892433,12149725401389639233,131072 /prefetch:82⤵PID:3472
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2220 --field-trial-handle=1892,i,12503837702778892433,12149725401389639233,131072 /prefetch:12⤵PID:4244
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 --field-trial-handle=1892,i,12503837702778892433,12149725401389639233,131072 /prefetch:82⤵PID:5064
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 --field-trial-handle=1892,i,12503837702778892433,12149725401389639233,131072 /prefetch:82⤵PID:2276
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1004 --field-trial-handle=1892,i,12503837702778892433,12149725401389639233,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
823B
MD56675e802d9140b5793a741415c82d3b5
SHA1c99604f41cf97ceec97a0481895f685ece528c06
SHA256770c622f7f68d883e136b2e32e5852a4d082bc601931c4cffcc054d69bd8476e
SHA51210f48a68822e121064d1bf4d593522e22e4d5dceccfea0d5195f60f38db7e881082cbea18d1fdfe4fd52a8914770e72b62cd01b43d94a43a3bdf8e88c3570df4
-
Filesize
6KB
MD5a7134542fa824646edad0f4a1f5fbc9b
SHA1ee1544316521f07ccce36d70ab1e14a04f9ed773
SHA256cd6004e606844390ecd754005fca75a3d76d8be61d75d4f19241c77a13bb3d0d
SHA51228d45875b915546cca632e4018ea2484cfa5cb5f5a65a23b2706071882f28d6e14737b99ceca1ba225ee69fdcc6f2b04a05c06bf4626fd0871c3dbabfbc6ed2f
-
Filesize
6KB
MD5d04fd57cc3471828b0b869affbfcb95e
SHA1eb5e1e552786e092b2721660176ad2dbc5aa8a14
SHA2560d7662cae6c0d069e16c6877c7ac3ef84e10cbab6221aa5325f95a99af0d9722
SHA51257d775c557558b5d2788fcffdd7fed293305fece05a97b6c13d037a5472621aed91b549580f7488e977c240516067d242a6246965de921319524b21d52af5ed8
-
Filesize
116KB
MD531f94465c79a5ac492234f9232d00aa4
SHA1d0f1d6d1d84c1a351f439b36992ef5ff81d2248b
SHA256a07c87b04f73595775829378cea4412b183ccacf336bd188f7da4cf1bc7ffb84
SHA512ddc71692bf30db225c42f6b65db1cfc48aa4e87066207afdb44dd2899a09af716b0dc8aac5c0c79de6c5f70513aa498d399907706b2d132392fbea5fc6db64fc
-
Filesize
135KB
MD5eed5fae6d9159df297a4fc0d3bf2259e
SHA12112e48300747ab0a43964bc19a37ff119c36ef4
SHA256b47bde0f6c62bf72776e5175bd99a42f006ca6fefd3255efb1c0ffc1c52ad70e
SHA51238875f4774fe7705ffb807bf2a45f6100b4d749f90b1b6f256f8001dce4dcb377d7aedcb1d3042d5e583c755588ff0dc321124e8d71bb9a53940263b6c8f0972
-
Filesize
115KB
MD5522f4e530553f98af2b832c5831b11be
SHA1a68030ec17f1df6399af6c386914a91c8213da8b
SHA25633e7efbc470b1848f132770183fe933ded60ddb75c51303067e21ecb3a17719b
SHA5125a393f5d53ede00d6d47cb34537cc4cfb31af806a0506fae7a4fda278da7c750324d9b8726109fd3955df39c695321603aee2977974d02432989839cda0110b8
-
Filesize
116KB
MD5619c06e921c9a777caffb41188065baa
SHA176a2b8d2586f9fbd4a95a5f4f595c6a6fa58bbc3
SHA2566c409132d644e7795e7806aa297d4b8b9061fbb6b9929e180f74bd14b6b5ffe3
SHA512ac8f5ff8b25bd29d6611e4b05025110491caca4d2a03314cbbe66e4e43c934a19fcf0d82117aa834929741b26b2eea4168a2ea16139794c9e38317c96ae67812
-
Filesize
115KB
MD5d0d414e3bd2d189630abf3dda6fbd4a6
SHA1509f3ce8d5c1da783655fdeb41ffa169e20ed558
SHA256f751a08bd4338e983ff39acd45cb4ebd5885bd308c682a1aaa62082711e344b3
SHA512e2323a1d1f59c77a25acbd8707051f7fd670d1ee180d60a8ec4f210c18096e05b14f96ced153c25e3b3ff72cee717b28178f3833facfe11443fa6672b2225069
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e