Analysis
-
max time kernel
2699s -
max time network
2648s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 18:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://linkvertise.com/489327/test?o=sharing
Resource
win10v2004-20240704-en
General
-
Target
https://linkvertise.com/489327/test?o=sharing
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 74 api.ipify.org 76 api.ipify.org -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133647649042747432" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2753856825-3907105642-1818461144-1000\{BE24B200-7F3C-4539-A9C1-1B836C8EDA54} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4708 chrome.exe 4708 chrome.exe 3120 chrome.exe 3120 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe Token: SeShutdownPrivilege 4708 chrome.exe Token: SeCreatePagefilePrivilege 4708 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe 4708 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4708 wrote to memory of 1560 4708 chrome.exe 82 PID 4708 wrote to memory of 1560 4708 chrome.exe 82 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 3512 4708 chrome.exe 83 PID 4708 wrote to memory of 1580 4708 chrome.exe 84 PID 4708 wrote to memory of 1580 4708 chrome.exe 84 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85 PID 4708 wrote to memory of 2364 4708 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://linkvertise.com/489327/test?o=sharing1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe31ccab58,0x7ffe31ccab68,0x7ffe31ccab782⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1876,i,14369822045494139567,14172695581798641983,131072 /prefetch:22⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1876,i,14369822045494139567,14172695581798641983,131072 /prefetch:82⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2188 --field-trial-handle=1876,i,14369822045494139567,14172695581798641983,131072 /prefetch:82⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1876,i,14369822045494139567,14172695581798641983,131072 /prefetch:12⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1876,i,14369822045494139567,14172695581798641983,131072 /prefetch:12⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4448 --field-trial-handle=1876,i,14369822045494139567,14172695581798641983,131072 /prefetch:12⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4576 --field-trial-handle=1876,i,14369822045494139567,14172695581798641983,131072 /prefetch:82⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 --field-trial-handle=1876,i,14369822045494139567,14172695581798641983,131072 /prefetch:82⤵
- Modifies registry class
PID:776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 --field-trial-handle=1876,i,14369822045494139567,14172695581798641983,131072 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1876,i,14369822045494139567,14172695581798641983,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5016 --field-trial-handle=1876,i,14369822045494139567,14172695581798641983,131072 /prefetch:12⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=972 --field-trial-handle=1876,i,14369822045494139567,14172695581798641983,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672B
MD570c8e110af7b7a8eb1afed6f40aa8b2e
SHA17bf1d4074241337b7696d24d7e28ee707f7803f3
SHA2567ac78e0ad1fc79d42a59573bedfd29c4d34c789c7dc158d6b28cdf3748e45d39
SHA51251c6fe4e66099f1012ccf047582f3a22b51119ac41a78ce170dcbc3f681bd85771ffe356d6da45fac8e5a79ca1c3c2627816f3571dcb71588ddea71fa906d150
-
Filesize
5KB
MD5a7fc3a882a4515da30bde54e7cab5c43
SHA1981c6a6ee3ba4a484387767a52f047cf152e8432
SHA25693c8e31db8f2af4fc78369f06f65f464b8f98acf4ca1536e991377ee963e29e5
SHA512bd89205413d09403c91662cd168f724ed1ce20852ff7c0a24f692e5fc34d50e48f1ee102d0b023407b2f8766b03f227df8bbb31ece47f5fa1acb31157b56b2d0
-
Filesize
5KB
MD519a003a7f5042b6a441cab14d088ee9c
SHA1bf0d8f8e460fc2b6e1ea5f2e40e03c41cd9aad6e
SHA2567bc37769fcc5e60b7f8e7943733f7151ab908212039fbe73c83eb19d492597db
SHA51215adb2f8df910f92739e18d13327737004a2e5e02d0381fb2708b8ed6d593a481679f61d5c979d97caefdd6b16ea5e7d1519ca662ab5b25287f3313800538221
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD554472dec69a1248b529e0df351c829d3
SHA13fc29ddca23c99078a3fc64dd4965b73b74a7101
SHA2560075f5dccc4465e57ef26581f76057c640d0df0542d462431a1e73937af15494
SHA512f5a4de69e435623cbd7ffa13cfebe8e382724f71213b90b75eb016a2e3fd2d9b440ec0ca60ac094bc48b8f8c8020dad81b647914ff2ea498f40514da86752e16
-
Filesize
7KB
MD5199bc80aa61d81d9891f221f7c164126
SHA15b71ca98421d53bc78c50336d9be7e7faf1282b8
SHA2563c7e4f2886e151dd74af681d42fabe7f1c1669277c2de517f0dfab79096f518b
SHA5125a68e47afe17447ef31608c6343dd08fb56b363e7b9f2bdef98d1cff39c9a64b39c0e64843b6235f28c3f76a60df17649f9bc75822f304c5c8c51d234172eba9
-
Filesize
7KB
MD530de6ea3e94de851ea998e3ebfafe910
SHA1d05de30165e8884e7f700a7f3e803dcafef20025
SHA256feb9cfa8481b7ff3a5eef3bfaabc2615f60ad14dd60ac66ccf970becf25530a3
SHA5120d2f5edadb243759e10d42726a8ae1e8b912714c68f8575efbea5bafc85c76451d9098255017628ebcb516a7db2414e6aa7d515ee678b97c7fc0a4d4dee41703
-
Filesize
7KB
MD55fbacb721f9b38792233f55ce672f9a7
SHA1ca172ce3dad3cb02691879a01ea71d84fe049107
SHA256719dfc6e98a1c6255489b7aea25b2a79b71db32cf228aae8f1979aecba324f7d
SHA512eaed7b1292c6f1965efc99fc4743fb4da5ec28e7bfa40396cf00825c565d31143d2a1670b4cd6a9c8f05744b95f39df485a23a9ddb65c7994ed08245a4c36196
-
Filesize
144KB
MD505cd845c866ef7dd63085d81559c4977
SHA15250d048be19cef7e7c3c050c3a90cb1b0a60aca
SHA256eb148b73a789f11878495502592a293d2b8c9f961acdbc549fd1df28e3b5a1cd
SHA512bb04f08bfd785a3ce57afc0513e5f8eea968998885571472817ca08863e1e2aaad09d3ef43dba042927fb92148933326318464fbe4e65275a28a530572008c7a
-
Filesize
144KB
MD52a3630dbaae0f829f1d11fa032ec1141
SHA14f5f279d6b3269be1b43036f02bd820056b7c12a
SHA256a0e17237245055a77e2e1a243dbb23aca8020a6a0e9b469be5ebe6f310148ea7
SHA5122d608a6d6a6a6b7770cdfd3487399f265f6e0f1f6d4d39d7532a17a71d12a8c983af25e72cadc6883f9fbdadcdab05e9f2d5564810db348bae2ce41afce2ef44