Analysis
-
max time kernel
66s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 17:48
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Mark of the Web detected: This indicates that the page was originally saved or cloned. 1 IoCs
Processes:
flow ioc 10 https://pdb.nipr.com/my-nipr/frontend/identify-licensee -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133765985374268119" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2032 chrome.exe 2032 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
chrome.exepid process 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe Token: SeShutdownPrivilege 2032 chrome.exe Token: SeCreatePagefilePrivilege 2032 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe 2032 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2032 wrote to memory of 2016 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 2016 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 1684 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 2688 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 2688 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe PID 2032 wrote to memory of 4808 2032 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mocha.prioritywebs.com/~tradewit/Identify%20Licensee%20-%20My%20NIPR.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff99a8cc40,0x7fff99a8cc4c,0x7fff99a8cc582⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,13618724842446888355,3563115455896256181,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1836,i,13618724842446888355,3563115455896256181,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2108 /prefetch:32⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,13618724842446888355,3563115455896256181,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2248 /prefetch:82⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,13618724842446888355,3563115455896256181,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,13618724842446888355,3563115455896256181,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3688,i,13618724842446888355,3563115455896256181,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4508 /prefetch:12⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3748,i,13618724842446888355,3563115455896256181,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4664,i,13618724842446888355,3563115455896256181,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4944 /prefetch:82⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4968,i,13618724842446888355,3563115455896256181,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5152,i,13618724842446888355,3563115455896256181,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5803d2c03ff247cdef17c44362363ac8b
SHA14bd952ece7b3c427db11dad75b0d12cf6b0dd519
SHA256e6d9a18c8ed140cb28a8e1498cecf367ef59b435dfbf3fddcf7cb1547612240d
SHA512fca950750bc6458eba268c079706208fd6193643d102b1fc388f0b275442e4aeea8f3ec1104904838a695bfc923ac5e579dc0856380f713c733866d1079989c7
-
Filesize
1KB
MD52a391dd43fc6d6698884a395de31bfaa
SHA1eb75ed20fe9e3d222a5928aa73172c9a142c89d2
SHA25604155bdf3c6a7cc14411a3396eae4b1097a6ca56b6a1a7cd1acdb575744af732
SHA512d5bafbc33926be760fbef0923426ff9e1da5a21902112476400fb10b424acfeeb5a942c48964345c871d6d4cbfd9de8678650ac085d41e7c42c5ab4c6995fd22
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5331e1cffc83e4cd22e5a453905dd98b6
SHA1ee75aa4bedbe3c5d3ccd3f181e530d8c2e11d1f1
SHA256ef50b05f5dbce3ec7b091a19f3afcabfabb1fd2e2f38feeac045745661f104ee
SHA5126bd77371a07b334d6f791174fe7ba4b7239dddc593edff4f06ea6d05383955123a0befeb4d8913eb7be865aa2bdec371d47625b55015b39e3513785f40a8ea99
-
Filesize
10KB
MD5697073b83d414bb31bd0cdaeac416981
SHA19bf159d729facb92a2e6508ffa33307800ef0482
SHA256795054d3cd48a90a2b87f517369c1aa7b087e196925d35cf809bea97e41156d1
SHA51208cd581208b158864ac5f9f1394a700d96c3af390d7cec7944fa80ebfdcbdf32c95526eab127903f2727fc0e26831a73089fd60dc29d914f3ce47c952450c72d
-
Filesize
10KB
MD589f64737d7e32b9e50040ec0b25cf933
SHA1a7f78acc6ac98b25fba7d5d048a8f36de61a8af1
SHA2565d9b05c65b8db74657a46db4e57d1c76576f78c04300651935c29799fe6cff00
SHA5122f928b129711835ef91a423d8465903996585e89a47430f5c500b7be410d2d89e71acd5b3b27578b40d20cc904d5ec724e3b7d0962d285cd5ddcbe634b9d3efc
-
Filesize
10KB
MD597365993137cd31785d5faf7ec2e5e1c
SHA1bc9a8e43bfc5c3016123b44151949f5c0e746614
SHA256e3c885565a6ec90fc27dcf4f96904ce8ffa453cc736a535d32a12d6efe7a25fe
SHA5121112c049f68192aaf59113d9888b5b6d9892212b52a52c66789e8fe513e4ec81e3755c56367d3a038444379c46b25d4488864182595fe573e350d835c917f1dd
-
Filesize
10KB
MD56d2249813e5c97b947cd332c86f3916e
SHA1bbf7818eb781320ec7a2da586c7324a8e5f376a1
SHA256ffab08f55378ec48fbc3f19a5b6332a278e7ff2b1b194c90d77a0c0088f30b18
SHA512e4dd4f6d5a5592be417967d5932bb008431eaa1286701e11bac78cc4fa3fb60c02f8bc17f44420e1a18568d73ead2e531d4f6af6561d5caccbc5dc89967bca8f
-
Filesize
116KB
MD5e69271520c19b2392a51cedd9013e071
SHA1a71515b673c2826b3c602ba6482a6075f1b0b0d3
SHA256e873be836ae9d59c01896d422603c2c71e9a5c03339384e3bf31c753a1339eae
SHA5128be7b930f7b43cf5ed6f016cc9b9f6615d0afd24868a664e56023d91f38641b2dc6c82985e2ab606b01146a7155047da7ecc66da4f8da3a7ede0d7130bb0edf4
-
Filesize
116KB
MD5942c748a03d3c1e3ed66ae5c7d69e666
SHA1e691db6c848c1c192f1ee152e6c819dc6767fe1c
SHA256c51effd447d9c11ea4ddecd2d126092305b99e6745fb2d608d831d14bcbc1cec
SHA51250256e44c66cc608e74a27be2802e7063d5f97a08e0b11cae53735be65391832f73927b5f8c673d21e1a5a8e4c7991e466f1d82e93e70140990091044be8a3cc
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e