Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2024, 09:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://forms.office.com/r/5Bwk03UPNn
Resource
win10v2004-20240412-en
General
-
Target
https://forms.office.com/r/5Bwk03UPNn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133583372749942232" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4836 chrome.exe 4836 chrome.exe 1180 chrome.exe 1180 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4836 chrome.exe 4836 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4836 wrote to memory of 4408 4836 chrome.exe 86 PID 4836 wrote to memory of 4408 4836 chrome.exe 86 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 2112 4836 chrome.exe 87 PID 4836 wrote to memory of 1940 4836 chrome.exe 88 PID 4836 wrote to memory of 1940 4836 chrome.exe 88 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89 PID 4836 wrote to memory of 2244 4836 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://forms.office.com/r/5Bwk03UPNn1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff07a6ab58,0x7fff07a6ab68,0x7fff07a6ab782⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1916,i,12607557269629637312,9920649650175068362,131072 /prefetch:22⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1916,i,12607557269629637312,9920649650175068362,131072 /prefetch:82⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2232 --field-trial-handle=1916,i,12607557269629637312,9920649650175068362,131072 /prefetch:82⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1916,i,12607557269629637312,9920649650175068362,131072 /prefetch:12⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1916,i,12607557269629637312,9920649650175068362,131072 /prefetch:12⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4444 --field-trial-handle=1916,i,12607557269629637312,9920649650175068362,131072 /prefetch:82⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4592 --field-trial-handle=1916,i,12607557269629637312,9920649650175068362,131072 /prefetch:82⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1892 --field-trial-handle=1916,i,12607557269629637312,9920649650175068362,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD5f3b1642adcc7990191b7a76ebba56e19
SHA1fc4e6b59c77000bc0abe91a07a6617239d94186f
SHA25619847e782e6cbeffec1099eaf9708b6372d9f11d18120cc3ef8bfad3b0acf1e1
SHA51208f6d76c66706052188fb24ddb9a5d0119f16ffa109c4516c5d823bfcf957ac66287294867e1a6595fa9378558935b6924a190fd526a7062015e26c96b398054
-
Filesize
2KB
MD543e17d580115ab9ecb0ed66079e7dfde
SHA1d0125bc333d100fb3ffcdd32f9a319a88c02ab69
SHA256018806bf4b6733463a2e484a95a53f954b4756d41218746f811bf5f460a17624
SHA512187f84683dda45dbe42dfdd296ac4f9d491245a2ce55ba86c669fe249f63d9aab22ed03f35d6c7de3f6572b1d106a007f8bebfc3e71f2106a6cbece91524a35c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD5ad066f4f2c281351455c526e9e0c1bc0
SHA10f7c2752383507ba0a3e14261b8b5af0177ab94a
SHA25627475f5dbae82aa7a8cacddc51ddc443171af099be266c96c9fab9d08a5a443f
SHA5127315047f450ef6235d7c69fbdaee16a48b4d3a4aa14f791cb5068ab4749db8e8602651de117703781826ff2e6c8247034e49ffde282912d196015d18b6bcc143
-
Filesize
7KB
MD51c3a7841938cdff4bed380014c58158a
SHA1bfd5587b688ce10b348b29ed861e02654f8ddecc
SHA25677eb912f7c1eb307981a06ec092c50c8ac8057993ff0555f6b269119fec95e42
SHA5121cb07846a6cb9dc585a41d222a18434112d2a8dd91e291d03ff03112516654d16b25eb77e4ab77d0e1a8cd544c834e161cb0e32349bad51d8366404c72960d1a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\c67a00d9d1fe43239f2bf49bebc287eb867542bc\9ac04021-d484-4ce1-adef-d6f1b5c3c7e1\index-dir\the-real-index
Filesize72B
MD5091bb66705c109ea4220c613658b031a
SHA1e0a6896f21c31cdb7f25b9c752d7283596ea21f4
SHA256102528eef6c217e1a7a1aa08f1b3913cb967caac82915e17136b2cc328088443
SHA512fb89c5bc6f934d4499e3152a0e6dd72e86b69ccf739c17b87d847ef2347af7b0352d0cb46f0b769549e63c171358e9c40cc2e17e23f177e4220797c16cfe0a75
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\c67a00d9d1fe43239f2bf49bebc287eb867542bc\9ac04021-d484-4ce1-adef-d6f1b5c3c7e1\index-dir\the-real-index~RFe57ac1e.TMP
Filesize48B
MD5f4c50c3b19695e4e98da6a54b58fe0cd
SHA165b9a6379e5092fceddbbe251a294aa31c7d8af6
SHA2565cf5d564a66e5849243b458537eed8b2b4fec42cc01bb9f24f280b7f9757a48c
SHA512fcd6298245345534ad14a4d726a82c525a2a2bc7a31c9d5289d4a08195e6f85c8c5a463ffb7119e89f8c9bd2dbe105e19ee79d8bf01234ed3e1d303c1a897c32
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\c67a00d9d1fe43239f2bf49bebc287eb867542bc\index.txt.tmp
Filesize117B
MD57152052f89ca82dfed07e09e6e0dec03
SHA1f63247b9da3613eba7b555f327c90ecedcac06a7
SHA25682a8a7e5b6a5c68048c9acbef4b5b1f108aafd00ab3e9aa38a23caecc83cc4c7
SHA51243d80c8104e3a2689844cebfba2668167a1713afd94b0b6e62891e4a73e1e255799d67a6cbd33fbade55e738d6701bbd30fbefe7caf9ac93391ba196ef0bac35
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\c67a00d9d1fe43239f2bf49bebc287eb867542bc\index.txt~RFe57ac5d.TMP
Filesize123B
MD513f2c48b594f1c54395c9b185f2184ac
SHA12ec26a7333a64cd19ef0ea8102e0ffa1f5f4d198
SHA2565adddad06f881bf85d70b25a631e7e52eeac8cb3860f93ccfaf621552324f759
SHA5120beb5a7502d0d27d2a5ffae0b47288c7bf90da8f4b77ab2e3ceaaabced500f31fcf03bef6ad57f9f2a6148709e5aad52e41d3b0360ad3d298b99c990239204bc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD528284f0bd441499256514a42f995d3ad
SHA1fd8009c8ccc93cc4d793165fb21d48d3f9dea56f
SHA256ae2a6b960c44defdbe901a30449099c7b0be01c9c004e1f0da0e31db4aa591dd
SHA512f44e085a82141f046d398ba3bb469af884f1bd747959e1d3e9bd4aa6aff66336e3cd9ba7e445742f7229d718e524ed95316ff438fb8e8208ab91e4a777c7f930
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57abb1.TMP
Filesize48B
MD555774c9353f86074573fbc3e7819c0d5
SHA16566e1b609c25835125ecd8df35f06a35c16e38f
SHA25615a1919f06c4a5240542ae5ef711f740ae556d827096ce848d2bfe96401f6cd4
SHA512c0f6e1f7829f38f739fa7993c1c3888f72c22f3d2ecc7479ff078b7941b1a5893d302c1209c49b7a6375293024b7f3806a32cd1ec401fc1138caee9ba4fa9352
-
Filesize
250KB
MD5edbfad2004c7aeec8767cee41eca19bc
SHA1e80a81811a47db4b2806a3d2bdee3fa2ed7940c1
SHA256324dd364ead6936f20ec35abe6b8eeccd88905a0af3c0be8f611764bce872f39
SHA512f19c9a951476cc764e08d65d3861d1aebad6ffaf46ccca4d752260c7998b9962e0531c81c6b7334b39de6e6c43ee940396e9546ab6a8ed0c760469e4185f87ea