Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 04:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cloudflare-ipfs.com/ipfs/QmNXukHRSg7WZrfdCNA38bonJyRDSaSP8TQsomG78zpLNu/OusheR18783v.html
Resource
win10v2004-20240226-en
General
-
Target
https://cloudflare-ipfs.com/ipfs/QmNXukHRSg7WZrfdCNA38bonJyRDSaSP8TQsomG78zpLNu/OusheR18783v.html
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133612587926643875" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 2432 chrome.exe 2432 chrome.exe 5588 chrome.exe 5588 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe Token: SeShutdownPrivilege 2432 chrome.exe Token: SeCreatePagefilePrivilege 2432 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe 2432 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2432 wrote to memory of 4856 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4856 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 4016 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 2472 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 2472 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe PID 2432 wrote to memory of 5088 2432 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cloudflare-ipfs.com/ipfs/QmNXukHRSg7WZrfdCNA38bonJyRDSaSP8TQsomG78zpLNu/OusheR18783v.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff82e889758,0x7ff82e889768,0x7ff82e8897782⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1892,i,13751330078528606681,1637519090653084578,131072 /prefetch:22⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1892,i,13751330078528606681,1637519090653084578,131072 /prefetch:82⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2264 --field-trial-handle=1892,i,13751330078528606681,1637519090653084578,131072 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3128 --field-trial-handle=1892,i,13751330078528606681,1637519090653084578,131072 /prefetch:12⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3156 --field-trial-handle=1892,i,13751330078528606681,1637519090653084578,131072 /prefetch:12⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1892,i,13751330078528606681,1637519090653084578,131072 /prefetch:82⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1892,i,13751330078528606681,1637519090653084578,131072 /prefetch:82⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5244 --field-trial-handle=1892,i,13751330078528606681,1637519090653084578,131072 /prefetch:12⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 --field-trial-handle=1892,i,13751330078528606681,1637519090653084578,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5588
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4308
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:81⤵PID:5248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\42771835-202b-44cc-a2d7-f2f2ae4290d1.tmp
Filesize6KB
MD5b49be32b2ae54dee59e45e5a611bb223
SHA1caad46732fa404559f2ca3a08854bd047649afd7
SHA25644967029d5101b12a61ff4d64378f251468fac75197752fd1b35b323a6214d2c
SHA512c19766a1793f3cf77b2d6b3533718cedb0f3914cf29e4e29121a1db9515eecb63b83fa3be3b5bd63f928e24a3825e3662fb2c6bf008a9da897fe7c60c1715ba3
-
Filesize
168B
MD5c1f7e5a0f1c5004f730c43e4f8513510
SHA1c7abf06ba9e5fec4f97ffd7b1e9d0dcf5f181953
SHA2565e40b1bb472a68037abef664255d94c0a54e44ee25b7738934651034c982ca34
SHA512a73796bcbd57853d71e650c2d04e4a108320dbb4c6d3a7c2d97918d2154c6040e326336e25734a1a8e4f947cdb8a1222a8228c899188438d8ebe300ee93b29fc
-
Filesize
2KB
MD51d252cef9c2286094dfb7b1cab18d0d5
SHA1e3de6b3dd598c61011aa4852dccb67ec8855a1f3
SHA2569ee78d54cba6e4a06bc0bafd56b61d9788d00708db9d335384e6a8896e2bfde5
SHA5127782c1b4cd475f4ba3157d4f291c4d62ea9139a75bbb3d298f3c106362d9fa8e0651da32391807165f93733dc7ff13ef62aadcb7b7658cae0fb104de8b8ea063
-
Filesize
1KB
MD5b48ba7752d8c72b3d4440ca3b32a87c3
SHA18133c760dab83a4147ebac1ae1693005adebcaf0
SHA256272d2d8886bdfe63d8e141749cd23ccf03a65e647aa4ff8b6fa5d16ab7b39835
SHA512475a0aee69e6353b1aa202fb4394091e103b55d72c7dc159b6797a7db314de52bac77806c347d396df0ad0b71b41df3b3fbb3f3b10f595eecabada8b7387f3a4
-
Filesize
6KB
MD5a3abcd10b825531c774a81d845397290
SHA1ba120d4d1fc1af556b18d1004d0afd5b4b9bc2e5
SHA25642312ac3bc1ad193b812f6605e1c72b9f89b8fa0f151796093de4478cce59552
SHA512c57b4166a1cb668feef980376b5efd3715730fef771b1775c3fe5003ca2a5db2374faff913ca84312784d5cdef3a129602fe0d67296a9f9dffdcee782770f541
-
Filesize
6KB
MD569d2eed97ca1aad0b031c0ee11018a4f
SHA1d3725f3eeb3f12de3089a6154dca912e1314ff71
SHA256a19ad9c9d1a48da1e250c529f458b4455b6cc6790b074ab54c889b49b9936603
SHA512e8dd7f105c183a2efc3ee4800da71af6273641068a1d747b9b071280f4aad3e276255d57deb27f61b4b33e1d45c14126bba9e231bcfbcd2939e0aa98b8acb3c1
-
Filesize
6KB
MD545833e26f416c374bada58c673a9338c
SHA1c0cfe6901b9c696b52dbc5ea59a67926a9f516e7
SHA2567dc8ed7d5dcd1c8276510ddb741c682d8a6df59ab4cffc7eff9c1bdd29244124
SHA5123ad0bf99379839670a9b2f24f22ddb041acc8881d922791cf5650681d1ad21b1824efa5af157bcf61f0a5c010ac2600928a696e54cae3ff82d47fe812e4bde4c
-
Filesize
128KB
MD5f63becd6b6b93e90c9fd11c215cba33e
SHA1859d85ef8165e8f970a47849d5832dcd7852e38e
SHA25627b4acabcaa72755f36734108818f8cc45422945041b3cc729d4c3a59feaa3df
SHA512514459f1a99869690db60d2f5af5c7db9ceddc4deecc58654e19881031e611e89410bc4acba9b20e32e47822aa5f586bfd955905112ff5400fa36eff7a663643
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e