Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 16:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.canva.com/design/DAGF38MOfiI/_KJo0FHeJ62v6XcORFNFBQ/view?utm_content=DAGF38MOfiI&utm_campaign=designshare&utm_medium=link&utm_source=editor
Resource
win10v2004-20240426-en
General
-
Target
https://www.canva.com/design/DAGF38MOfiI/_KJo0FHeJ62v6XcORFNFBQ/view?utm_content=DAGF38MOfiI&utm_campaign=designshare&utm_medium=link&utm_source=editor
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133607811511639792" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1872 chrome.exe 1872 chrome.exe 3296 chrome.exe 3296 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
chrome.exepid process 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeCreatePagefilePrivilege 1872 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1872 wrote to memory of 4760 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4760 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 4996 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 540 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 540 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe PID 1872 wrote to memory of 2248 1872 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.canva.com/design/DAGF38MOfiI/_KJo0FHeJ62v6XcORFNFBQ/view?utm_content=DAGF38MOfiI&utm_campaign=designshare&utm_medium=link&utm_source=editor1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7302ab58,0x7ffe7302ab68,0x7ffe7302ab782⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1980,i,14592804861676961089,2330794937428122769,131072 /prefetch:22⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1980,i,14592804861676961089,2330794937428122769,131072 /prefetch:82⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2248 --field-trial-handle=1980,i,14592804861676961089,2330794937428122769,131072 /prefetch:82⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1980,i,14592804861676961089,2330794937428122769,131072 /prefetch:12⤵PID:1188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1980,i,14592804861676961089,2330794937428122769,131072 /prefetch:12⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4432 --field-trial-handle=1980,i,14592804861676961089,2330794937428122769,131072 /prefetch:82⤵PID:836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4168 --field-trial-handle=1980,i,14592804861676961089,2330794937428122769,131072 /prefetch:82⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4464 --field-trial-handle=1980,i,14592804861676961089,2330794937428122769,131072 /prefetch:82⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5100 --field-trial-handle=1980,i,14592804861676961089,2330794937428122769,131072 /prefetch:12⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4212 --field-trial-handle=1980,i,14592804861676961089,2330794937428122769,131072 /prefetch:12⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5244 --field-trial-handle=1980,i,14592804861676961089,2330794937428122769,131072 /prefetch:12⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1980,i,14592804861676961089,2330794937428122769,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3296
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3192
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2ec 0x4881⤵PID:2596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5656d8d1780f80060a9fb99534b6ec2ac
SHA1880c5c1a121e1c102cadd1e826fa1d0240215fb2
SHA256d1b64c59cbcf06d7efab6494b3d6a8b28da0dacac3c2a53922120fa845dfab68
SHA512c7c852b8d764f775c73bdf668ec4d9e30ec2a8a5cae8a9190d6726af82bb914c4d5b5fba3e8fed4b09705e21b8f9dc85724be4dea4db5798d66a8ee6ca6974f2
-
Filesize
864B
MD59baca3b3f2bdec344388cc95a997dbf5
SHA1e505d188a1206bbbd6dbe92e80de83bc01f2d8ac
SHA25611e7bdb75ff18ab47580a2a9a0b224d8e123930f2f4e9308a11eaeee37635824
SHA51245d771c8ff39b480a0dc004f6b1b37ef20b2b7d47b35c65e0945a6bea398fdd3e2de4cae0872f74d672a845d9dc5e6fcaa3964c452b14a278edbff1bd6d3626a
-
Filesize
3KB
MD59d43b20ed59717f9d5cdcf516015c8c9
SHA1aa2fefe5c3d20127f56311b5d6eb0441acac4235
SHA256f361f8afdb2942de047c38fc11b5b3ca92a4df5723d17f498ac4be7efcc36114
SHA512f5e569de8c575419d996fe7d047db716ac1d4549c152e1e7ba188c2c7a5f4c1ae84d450573ace74fb3c415cecb96c24136bde9cbf6f2b7d54f915c9e3d4323c2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD53f8776d167cd9a1c45b5b96e41c199e6
SHA1b30a2519f3226fb98a99f9a3962f971ff83b697e
SHA256da4910c131e6895624df552e4afa8a30d6a69b01bdefcfdf9d9f8f6acaa0ee95
SHA51258482554dc6c0830568305288276c6089d0e8719f29583a8c636656c7fcf9748ac227d977130e1817b93817ecf0a0314f2b1dfb2f5d3cc4a464c15d2e6e81e3d
-
Filesize
1KB
MD587242e6e3352c468de960a83725881d9
SHA17daf01a52c8a0efb5e27eb28b9123a70ae7b6f74
SHA256704596656ac4cf4e50c4c457f164eeec867ae2b1a5936bea957d437e353d6f08
SHA512a912e801a6b418124260f15bdcfa5aee51ce8cba6489c499d336df61f44abef0d60e13169e3e1b0d659dd0e229e3b134d89ecf3645f75dcc31c1d838fed38476
-
Filesize
7KB
MD51c5fd46df497450c89ab35b826ac08f1
SHA1d1a52df0b523ed19f6484ef16f08316ea0a3aa4a
SHA256413d7392cf5acecaebdf1bc839fa7bf10e8599c218df5e0418d2954c6a0c0840
SHA5121753ae3f20719de63d96bcc3964f8b133c5e537cc066685bb672b05ea31463a2ee950cec6da78667f8a287b5334953e4c98f72634aefe7c428879e070a1cd6e4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize216B
MD57d456854497bea67b8285ffb00045e8d
SHA157e079088ff1c3d027fc373d269d3f1611c2bdf3
SHA2562481da77bc8b6bc0739e6d9902019e18866707adf4a66ec4b67a8184c0a8653a
SHA512e6845db9a08f5f14c9dad22893bc52d9f0977035a5c8c6c092c4906f26a727dbf3ad714f9b9e09b0096a4b8cbd97e5ab4183dea730f84777691ac3e1976740fe
-
Filesize
130KB
MD5d6b41d57c61b93fa3f35a7ba01624ee5
SHA19288860f672624261896ae19315406bd1312af70
SHA256dc66947c72915aa87e82ffacb7b8871661aabca8ec94283c8dda00e8252b0803
SHA51287048872102e5cb227169a2b96a6c2fa1c5f1cc51dedfdfaee22cb26b5b5359e0a87d33d0ae1d5f712ac0c72f2d0ac025b683ec67a2fc568168432540e0ed7a3
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e