Analysis
-
max time kernel
269s -
max time network
246s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-04-2024 21:06
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cloudflare-ipfs.com/ipfs/bafkreihrqhiwqme7jp7scyopalaf6biqk7y7c3cqaydjsdmrkfkffn5dmu#[email protected]
Resource
win10v2004-20240226-en
General
-
Target
https://cloudflare-ipfs.com/ipfs/bafkreihrqhiwqme7jp7scyopalaf6biqk7y7c3cqaydjsdmrkfkffn5dmu#[email protected]
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133567384804759721" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 2580 chrome.exe 2580 chrome.exe 2256 chrome.exe 2256 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
chrome.exepid process 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeCreatePagefilePrivilege 2580 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid process 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2580 wrote to memory of 4388 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4388 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 3580 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 2524 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 2524 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe PID 2580 wrote to memory of 4488 2580 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cloudflare-ipfs.com/ipfs/bafkreihrqhiwqme7jp7scyopalaf6biqk7y7c3cqaydjsdmrkfkffn5dmu#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb191a9758,0x7ffb191a9768,0x7ffb191a97782⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1868,i,16381746157918409850,12836262309892704662,131072 /prefetch:22⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1868,i,16381746157918409850,12836262309892704662,131072 /prefetch:82⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1868,i,16381746157918409850,12836262309892704662,131072 /prefetch:82⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1868,i,16381746157918409850,12836262309892704662,131072 /prefetch:12⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2884 --field-trial-handle=1868,i,16381746157918409850,12836262309892704662,131072 /prefetch:12⤵PID:1132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4672 --field-trial-handle=1868,i,16381746157918409850,12836262309892704662,131072 /prefetch:12⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5016 --field-trial-handle=1868,i,16381746157918409850,12836262309892704662,131072 /prefetch:12⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3872 --field-trial-handle=1868,i,16381746157918409850,12836262309892704662,131072 /prefetch:12⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 --field-trial-handle=1868,i,16381746157918409850,12836262309892704662,131072 /prefetch:82⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 --field-trial-handle=1868,i,16381746157918409850,12836262309892704662,131072 /prefetch:82⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3172 --field-trial-handle=1868,i,16381746157918409850,12836262309892704662,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD520d3640784128832d1be8d3ef7d08ecc
SHA10a2b981746c89ffb2fe72b7ed28ccf8a53b4f678
SHA2563d9710744d0edbc2c32b975bfbcb979cef8a5dae73be01ed4ecb44e494afaf11
SHA51207d3d12a073aefbf34a827a76cfd8e28918426cb50715d070b32df12293af210175fc01f52b1e807f5c46373f2012109108416a70d75c8d990713b4ad5b99b15
-
Filesize
2KB
MD50947f42608f13afc27982f0c7fdad10a
SHA1d3d39a7bb699234f01841cd2175e983ba2dca55a
SHA256c451b50d82effc0822c3debcf870b440990511edbd8aea82fa6d15d0969a1115
SHA5120a6c550fccbb80b5fc76f087d4946106ee10143ea703bb8c2008b1a431774c567a02d2101444d1404f3f085871ee79b4ca890dce892221c8b298cfb90f60452a
-
Filesize
1KB
MD5d06cae365165e26775cede980d44edae
SHA19e142711deca2bc704f2484273c859827c6c00cb
SHA25674a921e2bafec814c84baeef4f7f45d3292e6369273dcc243dc02192aa5a0917
SHA51231c7ede692f7b2b56000f9a6ca3c88b2e3e32474133ff7cef186c48c0582ebe82a52c49e62ff02c2cd874557f509e68b9a1e13c3107a27199cbd116fb5207f15
-
Filesize
6KB
MD5e812b691fa33e9edb68b4ce09c6f68aa
SHA15e58417f0a1dac4f1703fe6bfe26d0168871c1a4
SHA2563c0a5725f836280c269b8becd9848c9b40445c8947bf7af20050a947c038066a
SHA512a8e683e213073cdd71ba6dc589a5f28e8b82fc15b672493ce4468d818328ab83749db648aeb5e9bc039c79612bf9b920774d649d217c7df8042397309d859037
-
Filesize
7KB
MD5e246aae15c1859c7a72f81c4ba401b8a
SHA13047c6c365a3d25d969f5dd2b176769cc34e6262
SHA256958eff5ef7c510556d6b98b19e5e4d9204cb214684e3e1bd22d431b41a84de0c
SHA512814644c55cdae5dd4450eb1f12788aa8ab21603c1f0a059a2a00cb2ae823c81a4f9766b86ed85f848a02168685adf0be5d2c144734ac095c97b9269276179799
-
Filesize
7KB
MD568e50f6abe8825a49d80ac50cf09a6aa
SHA107843205290a649a91126f62820b58242acd1b1f
SHA2567d481ecede5663c714747ca344a9968a8d7b9000ef298473c9d6c3242ef289c2
SHA512eea86f49b0a6a6e9e9ef14cdd16fac406db49b6be28f5eba4705167f9d0b06ef0effc8375a033be28adcfd1c0e0ca0d4b57488e66cbd3eccf69d8c8452be7920
-
Filesize
253KB
MD5ce29ca765ee750e894e67b3778d0bff6
SHA1c0f06a55d4dd42f281ea5c4634e805bdecb4d7ca
SHA2560482d0f78dc8395d38424fa02dc3cedfa4e7685952c635f80ab386b2fb3c7d0d
SHA512a1ca71a67f8ac27a163e3213215033b73650336246bf162366bbdf62619e697b548fecf32afe80835978dc885f1e689758b46d8d83beacd33da4c0f19a717bdf
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e