Analysis
-
max time kernel
299s -
max time network
295s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 17:17
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pub-65a11e270d2e477682166ed7b765cf58.r2.dev/HR.html#[email protected]
Resource
win10v2004-20240611-en
General
-
Target
https://pub-65a11e270d2e477682166ed7b765cf58.r2.dev/HR.html#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133638958562259723" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 3996 chrome.exe 3996 chrome.exe 220 chrome.exe 220 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
chrome.exepid process 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3996 wrote to memory of 996 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 996 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3056 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1744 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1744 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 1356 3996 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pub-65a11e270d2e477682166ed7b765cf58.r2.dev/HR.html#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9f188ab58,0x7ff9f188ab68,0x7ff9f188ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1920,i,44050938709103511,2309232648914895068,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1920,i,44050938709103511,2309232648914895068,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1920,i,44050938709103511,2309232648914895068,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1920,i,44050938709103511,2309232648914895068,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1920,i,44050938709103511,2309232648914895068,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4412 --field-trial-handle=1920,i,44050938709103511,2309232648914895068,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4564 --field-trial-handle=1920,i,44050938709103511,2309232648914895068,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4680 --field-trial-handle=1920,i,44050938709103511,2309232648914895068,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4716 --field-trial-handle=1920,i,44050938709103511,2309232648914895068,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4736 --field-trial-handle=1920,i,44050938709103511,2309232648914895068,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4704 --field-trial-handle=1920,i,44050938709103511,2309232648914895068,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2580 --field-trial-handle=1920,i,44050938709103511,2309232648914895068,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
168B
MD508bb11e5d42ef2560817b86166a40d6d
SHA15d36419f9a7af731a7350795ab1469715f2e63e3
SHA25693dd4dabad1fc902baa4c85aab6e6d93255bb5432ab6f7ddd0b426b605a4941d
SHA512ca10c2838cc1983299ec43af3de98ff2e9246c48e92afd1c195b705be2f07c6c5f543a0dc90edb1dd3cd721bfc993ca9a80d948faeb77050a02c2b2edcf3eb7d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD5e973aea985e72d1910093345758e1793
SHA128c9931b7e26a3bb7fa95252ac321c4d6621d09c
SHA256215fb24fc2aee21b608361d863728696e14844d8a3b8fb238184c1a54e9e8b08
SHA51255c78ac2b10e68a02b66f3d5b998210172a4da1bf93dfca7919b2f4a82610e4c2ecdd214aa7a26d7d71e6aae8dcfacc37ca2a373d233e36736d85e596d5ee562
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD5451e4a9d37b140de1ec055204e9cf6bd
SHA1770ead38573e3caedd61264509bdc3ddbeb32419
SHA25615e7e4fc455cbda77c85004f738b8b02f5a169ecdd1f157b496c54875943e8d8
SHA5120c44a444080ccd5552fc2d882a564a5eba8633d1339f6de48805be4ad9c521b8b970ac69abd8e5eaac7c743912d41d5acd2a439c5692ae273bb80b793a772c12
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
524B
MD5d1d1c31fb95520f66d427c44a224d891
SHA1fe63b49a3f92838c5d03f0a5f0ae91dd320512e5
SHA256e464493f3bc9f47532a9a57f6a0d3ebef5766a06f9f143d3bdf710c8534e68b3
SHA512d7fa22a92708aa9c00f79f2c6668aeb5916df0e692bf1ec821318be1b24174480a4a0871f97666585d7da7aa8b0c318613507be0bff43ac66e6e62c7d4033524
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD54885e27aabb39b9cf3001ff682e494a9
SHA1d3e17e2fe7f7dd8136515669248b65f8f1408609
SHA256ae0f6fce13d02dbc5b9ff0a255567e4e6730173c1bdb23a11e5300df06475e39
SHA512aab5befbe93bc584123df14ff2038da112039cda1ffee95a8c12243eb06c3ab9b7e2bba522846c08bf11bef1fd102f5d9af3fd3bf18a21b4c56adb3a41dd3d65
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
138KB
MD5f1835708026a40a2829dc02c607c16fe
SHA18613c08514b2cc673e9c669b18fbb0c0caf22468
SHA2565d3ef4e51ce081ba2837c7607627c4d80c837147b148de30f4023c8521d9aed9
SHA5121ec6a47e2c10d7853e1a1970dd27b2e7ce94fb778982e9a7bd1f4f3b9f8a098556d748c10c127f3a56d646e5ef523ed3c65334c6300d48314be10430542e1b9b
-
\??\pipe\crashpad_3996_GAWKQIYZIYCMOFBFMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e