Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 07:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docusign-kpdco.formstack.com/forms/docusign
Resource
win10v2004-20241007-en
General
-
Target
https://docusign-kpdco.formstack.com/forms/docusign
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133766477788079089" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
chrome.exechrome.exepid process 3764 chrome.exe 3764 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 3764 chrome.exe 3764 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe Token: SeShutdownPrivilege 3764 chrome.exe Token: SeCreatePagefilePrivilege 3764 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe 3764 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3764 wrote to memory of 776 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 776 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4372 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 2772 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 2772 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe PID 3764 wrote to memory of 4748 3764 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://docusign-kpdco.formstack.com/forms/docusign1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ffd4527cc40,0x7ffd4527cc4c,0x7ffd4527cc582⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1900,i,16829476769189789202,5435225861497897517,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1896 /prefetch:22⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2148,i,16829476769189789202,5435225861497897517,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2160 /prefetch:32⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,16829476769189789202,5435225861497897517,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2456 /prefetch:82⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,16829476769189789202,5435225861497897517,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,16829476769189789202,5435225861497897517,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4612,i,16829476769189789202,5435225861497897517,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4584 /prefetch:82⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4372,i,16829476769189789202,5435225861497897517,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5bdd581ebec4afe2a21d04b5e57c0ba68
SHA1bedfd7f4926c59a7757cb8c55347fee1d5bc9084
SHA256f2ad4075de7431832b7bec5aa835e34f38c511cfe292589606ad51150adf3ad9
SHA512f848ff1c973b4f2efada2e8a661355b12cee5af6eab5deb6371a6aaea4b32bbb2dee5b7435cb57c98f25ebe99cde72a23166f4f8d7c17012056c3f963a86a101
-
Filesize
120B
MD52707df4cf44cd528eca82e337eaefa87
SHA1943449d0415005eb439a904c3bd5c3af56a0d718
SHA256bdc4e909ee63a63e2ddc71083df3b58e1c44fb3f4d38a76b1f438723059c207c
SHA51257516a0013393459bdac27ac0dcf50fa4523140026f6432a45120e37172ff29239c3d0215ef1ef7042dd7952a06ce89e606f548212539bb7eb92b51625a67b2a
-
Filesize
1KB
MD5d1d744ca03ef5f6cd42a6baa79d068ce
SHA1e2a7002e5db846e69dc8c894f4dc1594f8c6d03e
SHA2564e06868937cf194347b5a13d34ae0269e0ba30c422c91af7aa1134fdb73591a1
SHA512e7d7722e069036b07924c767b9d3bb95d2b08acd1ceb4fc9505f908b639fa40404b4603e323d40bd8cc271facef2b3b694808db5323cb03fadc424bd8e9953da
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5ae11d9caa3c72addb7569148f3f68a29
SHA1a29549d50a40bad4894ee0a23d3a5120af1a40cc
SHA2564a746c896166b0a6586f58a0e77d52411151b81b7be773ea7a429cfd6fc7ae8d
SHA5128a2201a664455583762d7424342e6ce26a06f4f5503b2c21f2be9562929f9e896f1496213f5e5adec3d40c2e1fb53aaf6ec358ddac41347234ccffe59390b53f
-
Filesize
9KB
MD5dcaa81132df6b13aff221b02ef5b91ef
SHA14d1a0343c98ce65335e3ec0acd7c55bfd4b574b6
SHA25699939e70bc9da631621c21bb936e6a12c1bb79959ded7ccccb189c53bc2d7268
SHA5122e96cfa2e15d832823d27729c75d03a96b9ad29a86c0272e336200154e7bba2ae5c2f722389fe897d76bd77c312bafae01074cbd6e8cba22a6482591c6a958d3
-
Filesize
9KB
MD521d0a0437f50fd058c64d43e3fd3ce05
SHA1e0bac2de96d855b4245117247946f3a5748511dc
SHA256dc870c96aceeacaa1d5d641b0b50d5f81485f209a7dc9124fa5c50d10fd65986
SHA512b72c7970db9b6f93fc61bdae564b1ea738ef99d8d65c25c1c35713d91c99d873f104da12133375f1994ab0356c0267c495464bc22f6f41766fba7b10ca9084c8
-
Filesize
9KB
MD5f50c701eb9160a139860d884f5c5d4aa
SHA1f462c9a79097541e848dc63a4b74dc2a1c466812
SHA2562dad6ebe0696981299fd2c98f60f57e6a870ad09cd659eaa1e3f5fed4408eddf
SHA5124709404ce1a17bbb608dc2e80013ed6b6a5782c4acd3fde272be7f13d252f5ef6245fabb7b4ea932817577c408503cfa02dbf5c8f85a40d79b03bd057ea5fa12
-
Filesize
9KB
MD5c953c22e26d27787a68817bef5f75a1f
SHA114bd6980665292ec3fadc5c2339021933f7f7b8b
SHA25648e05319966955509b2bb17b653e38e33cd6e2ef89f18a9479341906fb4f5de6
SHA512db76e249d5a81cbe065d388b635de541166ecc9f50067e2e34a302dcac491478700e1c870b28a20eaaa29e0f381de1813ce28e382894c74d47172ac9be194b5d
-
Filesize
9KB
MD540375109492d10faf74e85400f9945b3
SHA1b853c704c11c7f672fcb3b33509f50d4023c2605
SHA2569b06bb08df922b5758fb7894ed87ed7d93b4feb1b53dc3a301084c63b8df9098
SHA512cb90faf18b0cb4c075d3153b71575a8151d224e9986d67db93b96ecdae49d9b81ce8cca746bd40101ef362e5003c7c4e6ca4edd91d38915641d77c1514f9e647
-
Filesize
9KB
MD594f34323536ada6a570bfd3f62bf24ab
SHA1f4fd9a54453691d4a24e708e15f1bba147b0c919
SHA256711da4436b0920983036d03cc9268d2fc42aad4afaf5ecc29828cd458cddd84d
SHA51275df68e508db10f9a014e4f89902b37e32e995983efea2a4d9462225fae1026b1fd15c6983caa05d48f607a0ab0f88c4ffa41c0a1315906f57e47be6b7b0f1a2
-
Filesize
116KB
MD5dc7a1f60c509db6614b9c81787ce2cea
SHA1e072cbd8300965379bbe8d4cf0bd7479241c0bad
SHA2562c350d92f0a2158568fc848b2adc1ad589c8e10db3c6fe452e12a86c63d78558
SHA512c5333fd2d8e2729f6cc9e8efbdcd98a72db650910045e1b661e4c55bddb466140fd5c51439c265f2c7407ce6289d6b8cd6fa70d543b47e1a362c29238ff7b5cc
-
Filesize
116KB
MD5b9d609617fbaf0659565df0301dc4e8a
SHA198fe38d1e05aa92539a08ee34e439c5f87b15117
SHA256b3660882cf22ddb93017708b8269693bfcf3f95ede4de29a57f2f7c19c3d32ca
SHA51262e000938e28ae706529e5f9254345d9933e6bb172bd107a87efd361c43a5cb67487214eb04c4d094e1ff48268e35ffff1b702597b48eff1b8e0bc8f5b039541
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e