Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21-03-2023 22:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://app.adjust.com/izw3imq?redirect=https%3A%2F%2Fekolu.co%2Fnew%2Fauth%2F%2Famtu5y%2F%2F%[email protected]
Resource
win10-20230220-en
General
-
Target
http://app.adjust.com/izw3imq?redirect=https%3A%2F%2Fekolu.co%2Fnew%2Fauth%2F%2Famtu5y%2F%2F%[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133239143767444067" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 4044 chrome.exe 4044 chrome.exe 3564 chrome.exe 3564 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe Token: SeShutdownPrivilege 4044 chrome.exe Token: SeCreatePagefilePrivilege 4044 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe 4044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4044 wrote to memory of 3372 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 3372 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4800 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4808 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 4808 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe PID 4044 wrote to memory of 2980 4044 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://app.adjust.com/izw3imq?redirect=https%3A%2F%2Fekolu.co%2Fnew%2Fauth%2F%2Famtu5y%2F%2F%[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xac,0xd8,0x7fff9c2b9758,0x7fff9c2b9768,0x7fff9c2b97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1824 --field-trial-handle=1832,i,1206241425978313740,14910662794364595578,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1832,i,1206241425978313740,14910662794364595578,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1656 --field-trial-handle=1832,i,1206241425978313740,14910662794364595578,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2744 --field-trial-handle=1832,i,1206241425978313740,14910662794364595578,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2748 --field-trial-handle=1832,i,1206241425978313740,14910662794364595578,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4312 --field-trial-handle=1832,i,1206241425978313740,14910662794364595578,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4808 --field-trial-handle=1832,i,1206241425978313740,14910662794364595578,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2944 --field-trial-handle=1832,i,1206241425978313740,14910662794364595578,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 --field-trial-handle=1832,i,1206241425978313740,14910662794364595578,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1572 --field-trial-handle=1832,i,1206241425978313740,14910662794364595578,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
216B
MD5df7715f6cb2d820186fae3edc9ef5913
SHA1803b6e8c239d7ee13594514719f6214df6fa827e
SHA25650cfd16b6078a26eb79b2e40b329d594293e83f9ea9e858f06484b55dfb4e84a
SHA5127df7f8e38271286ac823f9cc08ad66e8a25492009117236a847c9573522da64319a923bae767e6a841801efe34d766bde0ed81ff265316996d6224b5f93e58f3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD55a91f05484a7552921bfa6bd88f66b72
SHA1dfee8dd76176e35646faa0f8d3ec9e0914e3eb09
SHA256f1278c89652e06ae925757287a80bae8bc210d472be7fdfe32b7b35827aaa0d3
SHA5125bdec7e791ccf8e1e027c622358d4a70d3bf974d3eb059f3b288af23d27c2149287509c45943ba3eb2a2994d89b0f6a48faa72cd0a09750af40332c1f89beefc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
874B
MD5c9f518773a6bd589c5cb33d7667f875e
SHA11ca76e986506b7b9797938ce8df1a6497504cad5
SHA25603eef71e948c8b5042cc4dc207998156a4759c814b040ffdf3aff923e90c8982
SHA51276c6cdb8f265c7b4f0e873a23c520362c9f40225c8f9af0bfcd7db93f01c2617741f377d920ee30f7210313fee82803e8c2b02cd38e9529c23588cc7cc691607
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD553b215097f89f60a50991ab94e2ee077
SHA19564612f39202a0be5c9e1dcd7c0b5d53164c7aa
SHA256e3f1b17f20ac0a60a780b9ed11e71f4e437ebfa801e9c4b30704c666402155ab
SHA512abdf72fd10b4d301209f59bc11441c201b88f6b86dc97c45b3ec160396d7b9eeef80423144669d7a3440810bd86b0f7f20e1bb51a90135708910627ddeedc81c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD54db12ddfa640698ef4d9b9f5d79f1edc
SHA159f1525975dcb25885beb39db6f0a3e95cdb8c97
SHA256966cd04cb63a226b73d19d31c86d0fdbbfa71d373cb66f03c7aeced3f9af308d
SHA512ea92a212653df9734de53161ac65724d7ce46feba7f0f0c301097c19d2e87744438464c1fa737d11af69e9f03845fe85e683230045aa270d18484a14414ae884
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD59290a7572ff08b5ffd5a26673755e5ca
SHA16830a41b79198b23d994b35e6ab7c9b25cb6b013
SHA256e9ba06d36a3ba1bdd5060d27ec91278e062b7fb7039d73759e2dee0cad18d9bd
SHA512f1f75212e5062cc3e3229b65520e98acca07508827cd507e6d57fb98dad08da32f1c5afd9fc90657e8ef8d6ecced3e006e1033469770a6b038e3f12a380569bb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
144KB
MD5820694e4ba9223b0d94dd8f3fcbd9b34
SHA1f779657b05381888955cea29b68bd7cfb876244c
SHA2563e6815a744b26af8e0e67b6b9b6f5120395a67de1494bd7a4fe272bd78dd4c2a
SHA5121e0b3325af71e57a5441171fd0c2dcd52693483fa11d05c073320e7568c65293103b7193cee37d10776119a4be6ec0001506628dada48085f6f0a75ef9e22942
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_4044_UBZYRIDTZOLOUQPHMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e