Analysis
-
max time kernel
1799s -
max time network
1685s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-05-2024 22:17
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win11-20240508-en
General
-
Target
.html
-
Size
157KB
-
MD5
bcbb48d0f0da2f6d62abde07c27285e0
-
SHA1
3d825681a17a2ebf00ab77e9a8b7f20f34612679
-
SHA256
2831f61f19150f4b43b788759fa0f66d918426519e3a697499b6487afd05c824
-
SHA512
fd0bbb31cc7fabedbd235c857c480aac4f886e14c2c8d37d3ddc43f195798074efcb20ac2be2270c42b39dbc357f37c9c3f17d2f51dcc9a052b63c9a3b9aa2d5
-
SSDEEP
1536:E5AnoJ8FlTLJnLj/VIzpckr8df58MLzLoLfZK36MxhyfKGwhq+hm7Mn34gRDrkY9:Nld/VIzpcdDvyUjATs/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608900810489008" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
chrome.exechrome.exepid process 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 3316 chrome.exe 3316 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 2428 chrome.exe 2428 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2428 wrote to memory of 2252 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2252 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4888 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2372 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2372 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4768 2428 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcca40ab58,0x7ffcca40ab68,0x7ffcca40ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1528 --field-trial-handle=1824,i,250658290395564123,8812213177577690105,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=1824,i,250658290395564123,8812213177577690105,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2180 --field-trial-handle=1824,i,250658290395564123,8812213177577690105,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1824,i,250658290395564123,8812213177577690105,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1824,i,250658290395564123,8812213177577690105,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4292 --field-trial-handle=1824,i,250658290395564123,8812213177577690105,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4432 --field-trial-handle=1824,i,250658290395564123,8812213177577690105,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4240 --field-trial-handle=1824,i,250658290395564123,8812213177577690105,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4512 --field-trial-handle=1824,i,250658290395564123,8812213177577690105,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 --field-trial-handle=1824,i,250658290395564123,8812213177577690105,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2380 --field-trial-handle=1824,i,250658290395564123,8812213177577690105,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD5f03855918254c13aaf30e0e9f58c6ba6
SHA10102e9f22e7625907fb7c5fe213dfd30706f8531
SHA256f8d81fa56691515621d755ea841afaaea2b2f534e107448fdcc53560a29037f9
SHA51257e24478f2ee88d71c400ea7b743f1583deb91fac04776a85f4014ac5c29f3ef58fb2199851d71fc4bd33b90a242667551ecd7bf1393a222453df2a5cd2e0e25
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5903573d7a9021dc6b2765576602d4168
SHA1df4b47215a9b84f1ca204ac3ee559d245e688093
SHA25651306f4cddd3e6d762e0ec7094fa0cc727bb6f8481cc1d62739bc31382e54b4e
SHA5126ad973f033351a7bf7f483741866bf1d591465524e372d03a79a7d9b4e8f77789727e1177c2a920f1fb0bcc85dee9e35fc6802942e99fd920df78eb2bf1e9ca0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
257KB
MD55c01c78dcea9db4dd584482f9d4af82c
SHA11465e6a8fb6fe122d7e036328ca6a348a842f375
SHA2561ba38c8af986254dc089e3d414c3fc013b2c4968de59f5f2a0a4f278ca09be31
SHA512266ad8cdce135548a96a0bf6dacab39c075ceac1b5e2e4c30f3da5443b720208f4911bba1c9f9921c1d749a8a01d49a34e387bef987719f7f7d59337f3ea8c13
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
257KB
MD5e5ae152e92ce806e18243ad013e3ba90
SHA13b3d24fc4787f07015494346fb4f23acd40fef7a
SHA25610392d14fd93da15324a1f6b5bb45df3adb2d8b57cec30ba38091ba0e19f33eb
SHA5122182029f39997be2037f5018ec9ddcb6180e70bd94f8d57c9c2a340441127c6bad6fba496f0da5d636d86d8a44fac8401ad614cd24a7011deb7bce02757c2059
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
86KB
MD5a6ec937b100f45c489b4c438feb04152
SHA15e39f9c7b3d870241631799d1d97fde5936f3c24
SHA25614d3579217f15a06782d135eb04e97a54d588a022ff14886f3bdeddb0dc16d20
SHA512f7a60f32998aea2c86d5792c461ad737a9772fb5c7ae3679ece383e2c8b302566373db2ba7f0bc5b84b865790db562011789ab0979f6831a2f06744748f67087
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe57daef.TMPFilesize
83KB
MD56cd57271a08c69ca4899e18ee89382ec
SHA1c5e10ed486cebb69bd9203685bc0c5dd3b01c712
SHA2567537f7b71213ab1dc2d94275f82ec8b85e2d40b129114b6657266d23d6dd7853
SHA512bf793ddeac33e0ccc53c15c082ed25769c7826eac36633f150afa77ad78e0dededd660645f5306db03a1cb53dc5f96623fa829a1f5206454f06aedcb589506a6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\a59d43c5-cdef-481d-b508-350a909eca28.tmpFilesize
257KB
MD5448346b3a7b43cbdc0db6513a773f780
SHA1b6e7b5ba900f38784793fd021a77ab35cd20a756
SHA25629356d101b729b17b74b24821990a3abfe0b36192d281ee8f25a22089a45739e
SHA51228e944302d6046980027a3daf5660d997b1322da4ae351ddf589bced5415f38707078fd2193249fdb8377c5c38140b774f9b1a060e0fb23358f98838836891d7
-
\??\pipe\crashpad_2428_LDXYETBYUALCDPWRMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e