Resubmissions
22-11-2024 20:22
241122-y5y4wsyjcz 1022-11-2024 20:19
241122-y4a1nstqem 1022-11-2024 20:12
241122-yytktsxras 10Analysis
-
max time kernel
81s -
max time network
75s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-11-2024 20:22
URLScan task
urlscan1
General
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 ipapi.co 17 ipapi.co 23 ipapi.co -
Drops file in Windows directory 1 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133767805793674064" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 5232 chrome.exe 5232 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe Token: SeShutdownPrivilege 5232 chrome.exe Token: SeCreatePagefilePrivilege 5232 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe 5232 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 5232 wrote to memory of 5348 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 5348 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 3116 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 1392 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 1392 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe PID 5232 wrote to memory of 6136 5232 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://avidgroup.famislnc.com/fvcvfxfec/cc6d843dfd/?1f9da=bWlmb3N0ZXJAYmNoLm9yZw==1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5232 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9eb28cc40,0x7ff9eb28cc4c,0x7ff9eb28cc582⤵PID:5348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1688,i,18314990294592079958,10068319208910392772,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1696 /prefetch:22⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2072,i,18314990294592079958,10068319208910392772,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2124 /prefetch:32⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2160,i,18314990294592079958,10068319208910392772,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2440 /prefetch:82⤵PID:6136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,18314990294592079958,10068319208910392772,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3088 /prefetch:12⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3092,i,18314990294592079958,10068319208910392772,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:5436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4492,i,18314990294592079958,10068319208910392772,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4408,i,18314990294592079958,10068319208910392772,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:5200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4736,i,18314990294592079958,10068319208910392772,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4780 /prefetch:82⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD5d623e9731f4181d566ff50de96163b36
SHA1f0a89802a401a98816ca32ade79f31b4a3dd5dbc
SHA256908b6b5a876bde33aad9e25f4b894810afba574a41ea87e6895f3bb6fe4c016a
SHA512fabae1de33e778da928dbd58ef794e4cf582eda136152c33f9f9d07f0136888c5ea665269e20dbeb992f0a5fb4206efb834660ff9a6b1b529cfbbdaa4abd10f8
-
Filesize
649B
MD580ee69fdb41db5860b8b1423f605ae5c
SHA1484d5ae85a51eee6d084450652848d4fa1fa29f5
SHA256e9998521e241318618d6f0691cc016db9e39485fb6895c69065852722ed859f2
SHA5125a9d4b685cddb64dd16f812e6022f7373ca16c2c07ccf6778f986c3a2e6eeb5edc37fcbd8076ba5a117fd1e486a4353ec5cd5df1b740e7c84bf7e178b0adbe98
-
Filesize
264B
MD57a90ec41c6abf205bb73d2d2d2064ffd
SHA15383d51bd31d4b301b0689908435371eeab78f73
SHA25631fab9ad5585e481ab9c82eaa18acaf38dc494fc1a55852f3de57386ebdcb8d1
SHA512895d4a9271c38d43ceebba72e6566423e03e1f544ff79ca7a88d35c57d4bfecae8be41bf362fe48ba305f52679e1059130a665280a327c549bf766b8a468969f
-
Filesize
3KB
MD573d9008f3550e020659503c3372db18c
SHA1e5d8a0835e7e2c2396cd4344a152ac513182f731
SHA2564417750292899c3c823f7ef67b8efcc25b914698ad22cc1f56831a80f3c8e32f
SHA512ede5ad746a64dc798aa9b2f942494c3444405d0096c23b12490d49c9ebd5006ab0b89e691d0fbf695a87c1b5a7895c87009f243bcb37fd6d00d58582d9ae417e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD5570377dd87c26c455fadee9c20d2d977
SHA1bfca1a1900affb602cef1dc97422eb5b1d372496
SHA256c0232905b1c82571e666d75545b1df927ad28d167664e2388ed4c0f04187ddba
SHA512b310fa3c4f70d57f5600c5bf8248b2606523991c4887652aab8a26586891b1c8b47ad9bcafeb6f56d6540ec55fad8e84e94a747c9419a961dd30eb2ccb3daa07
-
Filesize
9KB
MD5273a73887ea40d66d3e891992a6a68e4
SHA1dc79a5adf20846a5f0b56098011a2149947f1a46
SHA256f38433a9ff4d138c8f9493277366abec794564faaa086cfb65a6734e5cf1e235
SHA51221709c1f1025ceda431f6e7a6f1159452808b0826e5d827ab54bf277f761bd1797669a65031b72c26badf815f3ddc00ddac3af30d62537222456267e3eb3aaa2
-
Filesize
9KB
MD52d0410774407f3d5aefc3a9ac888f097
SHA1ad72b1561938c017d27df64615e39801ed99286c
SHA2566568e3c99c1e37ea876ade04a1b2540f2082c1bb67a1bca21b29369352cbde84
SHA5121ff76bdbd92a580a96d77a6c295533136d5c65f207eea49bfd8ed624a87d5aa1ee5d453067874de4ff74753aab23100190ffcb45295f93f6cfa7a4c5fa925da9
-
Filesize
9KB
MD5e41ae10b140c39627c3ed26358aeb9f1
SHA1d5442ddffc0ba664f3c61ea174109d9decd72dc4
SHA256a01cbbd8d99ada53a7cddc4c4ca397fbe8dabba4a1df8b5b8bb69e7aaba0f98e
SHA51237dfc303c830f02376db1eb5a86bba234d6918f24bbf60b1417f24643c0634c8db0b01b8da82f92bc4a8a273e9410db74aab81322f10bd9cff7b1887900e7d22
-
Filesize
9KB
MD5dff5e35903b9cae2bf3c5142f34b28ba
SHA193872d1604710111279ef2de323a200aa5a349cd
SHA256ad65b787bbe78f2887da809990d8dbeb24e1809ed4989233f033a211a367e7a2
SHA5125231cc3520274acc4b5e78fa33e947a4e48ec37f079683a3fb695bf1389c5c925780517c37550afc6efc1266213568cef5db46777fadbe33a7d475374c287986
-
Filesize
9KB
MD57251810e609810c43917de3a31f4e148
SHA18da9882bd04c1f588618ac0149777e4d5228b8e2
SHA256765302a9a591dc10ebf13410859bd7b413b94d3cee3a087b4538a08ac47ce719
SHA51200ea94e817cade608649e1607cc56c942b555ea97a17bcf45732e469a7dbedbb63e0fe40094505e623900b841d4933bf3797328e03c8bed74d7a3eea98bb07f6
-
Filesize
228KB
MD519dfd9bcf669b3d708b953adc0b616a6
SHA18d1d2f8b6b95089101f026c1cb319b860105f546
SHA256c94a16254dee2a47b9dc3a8ce99b765e503f66bde092977e51ace1efc15267ee
SHA512d2204023f486ea371ce2b82e2c6ff31eed5bb43f1aefd98b76e9c55115cbb005b20108771dd1bb9a80d727136614d59e265968574f00410d534c353ce2cfe5fe
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e