Analysis
-
max time kernel
43s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 23:20
Static task
static1
Behavioral task
behavioral1
Sample
BrowserCollector_x64.exe
Resource
win7-20240708-en
General
-
Target
BrowserCollector_x64.exe
-
Size
779KB
-
MD5
71b5e70a257f47dd6c9ead4f1010bd88
-
SHA1
f75c41ecbf6f34ca0048534d72f8847b37c38229
-
SHA256
9edcf4905388c25cb2782272ed5458157c6fded7d6e5ef0439102f1c74fd9925
-
SHA512
475fd6c74c835fcdc765b56bb7baa18926e6da6c497f160386429938148f9277447918a678b41c9bf1293988896530f4fcac17d1fa93f630a446263f07d9f45f
-
SSDEEP
12288:ksUHsZCB1OcBfiv3P6gIo/Bw9av4Xzo0P9MqETKTvNo4UvXCt:k3RB8Wfiv3PJImBw9ag5P9MqETWxI
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Probable phishing domain 1 TTPs 1 IoCs
Processes:
description flow ioc stream HTTP URL 15 https://chatgpt.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8b5de1d9ece46346 5 -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2424 chrome.exe 2424 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe Token: SeShutdownPrivilege 2424 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid process 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe 2424 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
BrowserCollector_x64.exechrome.exedescription pid process target process PID 2420 wrote to memory of 2060 2420 BrowserCollector_x64.exe cmd.exe PID 2420 wrote to memory of 2060 2420 BrowserCollector_x64.exe cmd.exe PID 2420 wrote to memory of 2060 2420 BrowserCollector_x64.exe cmd.exe PID 2424 wrote to memory of 2432 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2432 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2432 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2656 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2924 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2924 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2924 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2760 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2760 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2760 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2760 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2760 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2760 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2760 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2760 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2760 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2760 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2760 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2760 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2760 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2760 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2760 2424 chrome.exe chrome.exe PID 2424 wrote to memory of 2760 2424 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BrowserCollector_x64.exe"C:\Users\Admin\AppData\Local\Temp\BrowserCollector_x64.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7179758,0x7fef7179768,0x7fef71797782⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1192 --field-trial-handle=1248,i,9012124892196116962,8548142684170838583,131072 /prefetch:22⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1524 --field-trial-handle=1248,i,9012124892196116962,8548142684170838583,131072 /prefetch:82⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1624 --field-trial-handle=1248,i,9012124892196116962,8548142684170838583,131072 /prefetch:82⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2332 --field-trial-handle=1248,i,9012124892196116962,8548142684170838583,131072 /prefetch:12⤵PID:568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2340 --field-trial-handle=1248,i,9012124892196116962,8548142684170838583,131072 /prefetch:12⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1484 --field-trial-handle=1248,i,9012124892196116962,8548142684170838583,131072 /prefetch:22⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1392 --field-trial-handle=1248,i,9012124892196116962,8548142684170838583,131072 /prefetch:12⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3648 --field-trial-handle=1248,i,9012124892196116962,8548142684170838583,131072 /prefetch:82⤵PID:608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3720 --field-trial-handle=1248,i,9012124892196116962,8548142684170838583,131072 /prefetch:12⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3452 --field-trial-handle=1248,i,9012124892196116962,8548142684170838583,131072 /prefetch:12⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2480 --field-trial-handle=1248,i,9012124892196116962,8548142684170838583,131072 /prefetch:12⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3428 --field-trial-handle=1248,i,9012124892196116962,8548142684170838583,131072 /prefetch:12⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2236 --field-trial-handle=1248,i,9012124892196116962,8548142684170838583,131072 /prefetch:12⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591b127a9fedbd0a5cae8f2599d2a45e2
SHA10371ee27fcdfd0facf589dd00286b336559996fa
SHA256c8d10c1b524f0474a20c0f7ae5e4e6e91aa62eab519757d49a4519812c6352d8
SHA512bc6e84fc89a6d730a1bcabc790eff5c21ff2f2272e891a37830522cb7fc985cf54d8f0c5446b7e1542cd66bdaef5ba6a68e2abd13c64f3a3c98e60324325c959
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
526B
MD50cad8692ce00ada2d5237b76bbab9f3f
SHA1aea597cc19580fe193e1dae8b3c23444be718953
SHA256377631092eb88cd5c43c9fcc2e3a34b8a66f8f58e0fe65b322bdba41271da103
SHA5125902c94f3b33f570006ac8cfb5bcfeec2a1d4ff93d7748266da635191f646d3d9bc524d8e149f5a17303ad6d60eac01a429a1f44d159518e3bb605104143f490
-
Filesize
6KB
MD5b7de134bcedfeec1f8569356bd81a107
SHA18a03acb84e3a5a37bccb9054a1156a72daa2a5c7
SHA2565502cab24e3a7724ac41696badc0e4f027be6cf2a001f335e499347ccb88c3f6
SHA512e3572cac80e7315fc4e416209924a4f867fe001696b1fc93613c554d207779dfc9566738244733d7bf1304d87b9553969bf848caa1e650889ead5359a63e6487
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
315KB
MD5956344b8a8dcb8e933a0bd22f7db297e
SHA17a7ceed8db47b1fe0df005e20f911bd2a86715b5
SHA25658eaf7956676fc802d806a7272057028fb355eaa38a944dfc1de382e730ab064
SHA512fbcd943455ea7bd3eac4bea52631476a97a5af7c0f05f30b7002214d90fb413aa627b02d6237427cae5e64e3cb1bb0288981c0d42e905e2dbf4cb50ee97153cd
-
Filesize
315KB
MD5166db2e09736ac2bf13cbf1c1e28413d
SHA18a8f9653f52ee771061905c439ba549b65abc45a
SHA256a937e0092be0111fdd78d7377135b6b1e0b4bcd9175840270d86e423211b29be
SHA5129dee80054a78c18581a0040031dd8a8980cfc6cf36df4862bd9075694d5255fb926ffac69840ea4ac32a9de95ff4ddec62a0a2aab20e9f57b5c367cae883a522
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e