Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 17:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://https//zoominfo.sjc1.qualtrics.com/jfe/form/SV_dcA6izeuyafhhLo?Q_DL=69T99iFWoVW1B52_dcA6izeuyafhhLo_CGC_GqdmCEi6PaAK1J4&Q_CHL=email
Resource
win10v2004-20240508-en
General
-
Target
http://https//zoominfo.sjc1.qualtrics.com/jfe/form/SV_dcA6izeuyafhhLo?Q_DL=69T99iFWoVW1B52_dcA6izeuyafhhLo_CGC_GqdmCEi6PaAK1J4&Q_CHL=email
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133645028975693244" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 1472 chrome.exe 1472 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3016 wrote to memory of 1916 3016 chrome.exe 80 PID 3016 wrote to memory of 1916 3016 chrome.exe 80 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 3624 3016 chrome.exe 81 PID 3016 wrote to memory of 4728 3016 chrome.exe 82 PID 3016 wrote to memory of 4728 3016 chrome.exe 82 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83 PID 3016 wrote to memory of 1836 3016 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://https//zoominfo.sjc1.qualtrics.com/jfe/form/SV_dcA6izeuyafhhLo?Q_DL=69T99iFWoVW1B52_dcA6izeuyafhhLo_CGC_GqdmCEi6PaAK1J4&Q_CHL=email1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99039ab58,0x7ff99039ab68,0x7ff99039ab782⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1836,i,12416230371701406311,14902724666885099278,131072 /prefetch:22⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1836,i,12416230371701406311,14902724666885099278,131072 /prefetch:82⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1840 --field-trial-handle=1836,i,12416230371701406311,14902724666885099278,131072 /prefetch:82⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1836,i,12416230371701406311,14902724666885099278,131072 /prefetch:12⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1836,i,12416230371701406311,14902724666885099278,131072 /prefetch:12⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4044 --field-trial-handle=1836,i,12416230371701406311,14902724666885099278,131072 /prefetch:12⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3204 --field-trial-handle=1836,i,12416230371701406311,14902724666885099278,131072 /prefetch:12⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 --field-trial-handle=1836,i,12416230371701406311,14902724666885099278,131072 /prefetch:82⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4356 --field-trial-handle=1836,i,12416230371701406311,14902724666885099278,131072 /prefetch:82⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4460 --field-trial-handle=1836,i,12416230371701406311,14902724666885099278,131072 /prefetch:12⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3308 --field-trial-handle=1836,i,12416230371701406311,14902724666885099278,131072 /prefetch:82⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4124 --field-trial-handle=1836,i,12416230371701406311,14902724666885099278,131072 /prefetch:82⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1836,i,12416230371701406311,14902724666885099278,131072 /prefetch:82⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1900 --field-trial-handle=1836,i,12416230371701406311,14902724666885099278,131072 /prefetch:12⤵PID:1080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=1908 --field-trial-handle=1836,i,12416230371701406311,14902724666885099278,131072 /prefetch:12⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3228 --field-trial-handle=1836,i,12416230371701406311,14902724666885099278,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD59adc2a00e3fe4ee7e94424c3373dd2b3
SHA1027ce830f8dce6ff737736c10328ec0791350103
SHA2563426da34cdde8e6899b5c160cd900818ca7e05bb64cea5e66bab1da32e249fc0
SHA512e1b827895fc1ab174b80161fb2faa016c9f81811e9aed426482be7d66df274d5941b4e48669a87422cab4191cd9836f5980ff12aad904526ec766831cbc136d4
-
Filesize
257KB
MD5b7fcaf7f6d912cb7f8f9bc60d89cec2d
SHA11dad0cc41302a9b05a32e4b515df1bd6be072071
SHA256db8b434f7c5d03cb034ac4e9ad2c689b5e03cfa520d3e87eba96a80ffbc042ae
SHA512b230ac1dd72ff6246c8f0b14b48eaa6d05e320c1ff6b8974bb95418876c8e2334dcb80a0d050c6da9ad34ca497b817d36a80810ef14c5f8e28acf1fe7b3573a0
-
Filesize
257KB
MD5374c03b22366f2a51780bd469224f5d2
SHA1365cd62bc836414f0cc60c80c53848dd4e95ea7c
SHA256c0fffe8d534951e63a1d3beb8035e2946ca3395106b6c4e5c9bb58f7f39baf70
SHA512b0bb5e6a8eb8868c5a2fd5bd5836b7feb0854460a6a5f547860896e40b1a084f6962f0ed5bda30380e93568460c550cfd4ef05042764320a0ddb525c74904b13
-
Filesize
91KB
MD579b9a1b0f867dc1e8d9c5027cb4ab6d0
SHA1988fa401e2f0a471039ec7dcdabee3aca5ce0799
SHA2568a9c25a18b0fa1de400a1ef661900ace91cf0fd4b1a72c382235f210cb8170d5
SHA512eaaa7bd7ba5c85f0202e4aed8189053368ad01c5d6767218e6082e13125ae4b47b1de2f18fa6d1e684e820fe1f669bd8e8fdf66a9d3ee1ef065b02ccc20a2635
-
Filesize
88KB
MD5defd684444e81dcd483a5f532329e844
SHA1beedc7710c60f81750cb455beb69045ca61e7367
SHA256220502e1d39bc7ce8b2a3c4821b0efc577fad3536fa3423432fb3f75e34f296f
SHA512f4cfe380b13f288e981f0968a27a24bca41f6648c72808cf4e450e39a25c000d2fe02ee6318c9fff4d0a4ac231c2a54913ad930a0834fe099dd595895b84d5cd