Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 09:29
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133305174157727845" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 764 chrome.exe 764 chrome.exe 1976 chrome.exe 1976 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe Token: SeShutdownPrivilege 764 chrome.exe Token: SeCreatePagefilePrivilege 764 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe 764 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 764 wrote to memory of 1280 764 chrome.exe chrome.exe PID 764 wrote to memory of 1280 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 4036 764 chrome.exe chrome.exe PID 764 wrote to memory of 3296 764 chrome.exe chrome.exe PID 764 wrote to memory of 3296 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe PID 764 wrote to memory of 212 764 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://aka.ms/o0ukef1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d6229758,0x7ff8d6229768,0x7ff8d62297782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1808,i,8959891915306473964,1535613187284655968,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1808,i,8959891915306473964,1535613187284655968,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1808,i,8959891915306473964,1535613187284655968,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3224 --field-trial-handle=1808,i,8959891915306473964,1535613187284655968,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3244 --field-trial-handle=1808,i,8959891915306473964,1535613187284655968,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4552 --field-trial-handle=1808,i,8959891915306473964,1535613187284655968,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4536 --field-trial-handle=1808,i,8959891915306473964,1535613187284655968,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3432 --field-trial-handle=1808,i,8959891915306473964,1535613187284655968,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3436 --field-trial-handle=1808,i,8959891915306473964,1535613187284655968,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3980 --field-trial-handle=1808,i,8959891915306473964,1535613187284655968,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000010Filesize
162KB
MD5839a6afa03312253885699c84a96e70b
SHA17d58a182c70501beac223c48636c059632163e65
SHA25690c81168c32945db973e0a1da67d6981293a0b3b996459c488ec409a188a7f1d
SHA512d3759e7d1a16979833711e15b5064262ef5f3728b1f9941db34aa0b6fb9ea5891ac441bc708f3a56343763d017cd3257e368abccd5be816b9c8a9754f987b524
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
552B
MD5a6f6cbef7fcd017e48b4ff18cfc07e1a
SHA1bfb5760ced65e32f9d4eda3e4daf0bdd00ea139a
SHA256ab64fb39670fd2517c0c4522e985f9bd3534d1a74fad9fcedfd36f5b97869bf0
SHA51274a24e488cba211f03bb50358893685e2ef427240ac205fbaa3ce23bd4c3b9aac3fe26f1bafa92aac0b29550b76336f4c8f372f22a181c8cf8916ae6eb9760e8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD5bcd0dd99e0049a22679abde8b0a76f62
SHA161a684de69220b8f2d5c3bb013bf52731c22c1e6
SHA25643e838bcc1dd776be7d377bb6a202dc75cb8ae83fe4f79f888a7b96d17f59456
SHA512c2158c2c9fbc9127c818a72fdadb9aac049df856b06f4f13d619229f4fd82620cba3c08264245af49dd66b0ba048653282f709743c95ca05dc26273cecb260a9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD560f3392131b647f03760ffc9f12167ff
SHA17c5a1cb2d9285747561cc409b355f0d9b8c5af94
SHA256d161ebdaee91af5a26d02dd0e5cdcaaf959bd7937b9fea97035bb12e1fface83
SHA512bc8e90c762240620e02d02d8c77c3743820544def7cd322aac3c4ea67754c805c11bbfa9da5e42047afe54bb3fde0ad42bf2fab01aaee1b14a0f5f9ccd05949e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD56cbabc848639977187f3dc73b3c99630
SHA14584721cce5b49b0310c6f825fea42af868cd15e
SHA25611a203464eeed7f4479cf0d16bec0f5d3443a0a3e0586b731feb994141d133a2
SHA512c108e6264f865f579eda6a189d0a729d5b270db8d03e464624db8c9644800718ddc9594f47cc05bd5198a7c47a0153d94323d0a4d74cf53afe6b58bc86d7e5bf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
874B
MD56b705ff91d8f24154f81ab11fa1c841e
SHA1912c271f3f84e55e6db2b98122346bebfddb65d8
SHA2565ba8823689dad142cd5bdfe93b1efba8f3b77bb96692d2ff9825f9210460eb90
SHA51247e62e0b745b422ce7df04f72145c3a9bdb2685c47eb4680a421af06e976332abbff86e11470d78ec544e5a2fc7282d86655ade3a96b4c81528cdc849b4e95fc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD573d66c6f5f7be5ec73c22230c3794e09
SHA1befdd211fcd456dda9ae1d420cc1fff6aa157a6a
SHA25617e89bf3f3a07061f170b5341328435801b10dea516b482ad10a729ff36438b2
SHA512a8e9a55ad463c2500868c1dbb80a719f0757a7a35432ea16434e4702e448b929a0473b88989a426f4144bdeaf2f33747219fe01f473fb7bbca09bda101c09148
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5c58b12fa9e8c59166f936c6d3afcb1ed
SHA1ca2542f2438a3b4fb18eed9a3949bbd615a89c31
SHA2566e9a2cc6271ba680f68734c51c5ab880502b9b3acacba76fb4847937b179a1e7
SHA512f3e1f445c6e8304e6cdb520ec619aebced8fba6b62f004602900e6569088c8ff5fc846bf685e714fa6521a89b5bf4210f10024844dc2dcdec3f41022412a7801
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
157KB
MD5237dfb56a7c3cb302f9a75285845bb8f
SHA1917a5078f57fc48a6850746a7813822573b80e29
SHA2563402ac74a4859e3f14f364fb830663b9cd6ddee09bb19ccd3fb8e8ebe1a198fd
SHA512fb69b31d9fdff93f5c882289fecd9086c451048ed457b718ae92a2d589a841afa39d2b4fada225b49259b1936f0a5dcd923f0bb5fc6e4670b20a25ef2018b503
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_764_QTZLWENKQCLKJGAOMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e