Analysis
-
max time kernel
299s -
max time network
292s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://partsbase.us20.list-manage.com/track/click?u=dffff8a6585284bdcfa2981a8&id=72e345fc9b&e=166cee12dc
Resource
win10v2004-20240426-en
General
-
Target
https://partsbase.us20.list-manage.com/track/click?u=dffff8a6585284bdcfa2981a8&id=72e345fc9b&e=166cee12dc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608952833409978" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1840 chrome.exe 1840 chrome.exe 5088 chrome.exe 5088 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
chrome.exepid process 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe Token: SeShutdownPrivilege 1840 chrome.exe Token: SeCreatePagefilePrivilege 1840 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe 1840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1840 wrote to memory of 4768 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 4768 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 2672 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 4616 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 4616 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe PID 1840 wrote to memory of 3320 1840 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://partsbase.us20.list-manage.com/track/click?u=dffff8a6585284bdcfa2981a8&id=72e345fc9b&e=166cee12dc1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf87bab58,0x7ffaf87bab68,0x7ffaf87bab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1900,i,14934295960611262632,12697196437613247284,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1900,i,14934295960611262632,12697196437613247284,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2216 --field-trial-handle=1900,i,14934295960611262632,12697196437613247284,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1900,i,14934295960611262632,12697196437613247284,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1900,i,14934295960611262632,12697196437613247284,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4360 --field-trial-handle=1900,i,14934295960611262632,12697196437613247284,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4524 --field-trial-handle=1900,i,14934295960611262632,12697196437613247284,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3404 --field-trial-handle=1900,i,14934295960611262632,12697196437613247284,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4704 --field-trial-handle=1900,i,14934295960611262632,12697196437613247284,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 --field-trial-handle=1900,i,14934295960611262632,12697196437613247284,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 --field-trial-handle=1900,i,14934295960611262632,12697196437613247284,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1900,i,14934295960611262632,12697196437613247284,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00000eFilesize
206KB
MD5f998b8f6765b4c57936ada0bb2eb4a5a
SHA113fb29dc0968838653b8414a125c124023c001df
SHA256374db366966d7b48782f352c78a0b3670ffec33ed046d931415034d6f93dcfef
SHA512d340ae61467332f99e4606ef022ff71c9495b9d138a40cc7c58b3206be0d080b25f4e877a811a55f4320db9a7f52e39f88f1aa426ba79fc5e78fc73dacf8c716
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
312B
MD504a8be169551c84760c9a175812ede10
SHA1236c7441b66e8f55733583f30fa39dff2c4c6f2f
SHA2562c2bcfbec08f921306a4e8f50490275f7eec9bb6857f9e84d94da2a2c2f266b6
SHA5128908202ba60a16cd6061c38ffda0e3727fc9108f590f9270e58f7c8df97315f588246b4421ab71e98c99af6d2a0bc190a904809057438ee15378d03165e5a527
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD58c37ca2252d8cb3ce550243cc9075d0b
SHA1942b86526e7558992f73e0c4f33f470dfa21fe0d
SHA25608b951e2470babaa234a5312a4d56c6039d71c10e47680ec8ff5801430dd225e
SHA5128aeecccf95cf8f6d6a8701937bcd622e75a59af4cec143b4a356c22a988fa0e6fb626c1671e3169b935b2bff6644d0b8dfe884d478d17f4dca76dd1d9154993d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5e1619c1b30ea43c5a746eae1b1f4f4db
SHA1d0828347fd2c0d3b05773cd38d203ff57e77c170
SHA256ba7ac5e30b9037b1c4eee041e60f66541700654038df90396a1e8eb8c51fc3d7
SHA512d9f043629f1d831f4321e54089ade9a1961a399ffe46c1a54feab9479504c885a22d3ffa2c7174fa67781613c5c0c81ab3b534d6a4c79c1373a72091bcd8fed4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD55d0a167a5f094713e7993848716a70a4
SHA108ab0adccc2eba283476c33a58e54ddeec32c262
SHA2569bc92c7ba8a23d0e352042ab95ad328738ae1a004988d03ff7100f55d923c006
SHA512101c7b9cf6a70d5178efcdfbbd5579a14959b47d6d5b2f7bdf8aa881bdb42094a19c04eede69969a70e94c8d39ea9e990cede9a67ca894dd005c521091b61f9d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
130KB
MD58610d14bff222f3151ca0ff8a9d2b2bb
SHA19e077a287006af094de63ddce8e6772e648bb901
SHA2562fcc52b7dcd8cff25419c2cef962467a8333906ad86803474d4400b60bfa1d38
SHA5124480fc6f8e600fca972b13238211fd655913508ae3dde746da9e8fb64d8f236ec42cffb3399a2bd3d1be64fbea5c94470f396fdb8532a3689c67f6c06268f2ad
-
\??\pipe\crashpad_1840_BPDMQPPTTJRZEABJMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e