Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2023 11:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.sirva.com/docs/default-source/pdf-documents/global-cybersecurity-customer-memo_final-062218.pdf
Resource
win10v2004-20230220-en
General
-
Target
https://www.sirva.com/docs/default-source/pdf-documents/global-cybersecurity-customer-memo_final-062218.pdf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133236153476374413" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 4972 chrome.exe 4972 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe Token: SeShutdownPrivilege 1580 chrome.exe Token: SeCreatePagefilePrivilege 1580 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe 1580 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1580 wrote to memory of 632 1580 chrome.exe 87 PID 1580 wrote to memory of 632 1580 chrome.exe 87 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 3776 1580 chrome.exe 88 PID 1580 wrote to memory of 5000 1580 chrome.exe 89 PID 1580 wrote to memory of 5000 1580 chrome.exe 89 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90 PID 1580 wrote to memory of 3096 1580 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.sirva.com/docs/default-source/pdf-documents/global-cybersecurity-customer-memo_final-062218.pdf1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcec559758,0x7ffcec559768,0x7ffcec5597782⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1804,i,3297194176379949352,13100079440248057829,131072 /prefetch:22⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1804,i,3297194176379949352,13100079440248057829,131072 /prefetch:82⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2264 --field-trial-handle=1804,i,3297194176379949352,13100079440248057829,131072 /prefetch:82⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3144 --field-trial-handle=1804,i,3297194176379949352,13100079440248057829,131072 /prefetch:12⤵PID:3652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3152 --field-trial-handle=1804,i,3297194176379949352,13100079440248057829,131072 /prefetch:12⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4552 --field-trial-handle=1804,i,3297194176379949352,13100079440248057829,131072 /prefetch:12⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --pdf-renderer --disable-gpu-compositing --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4728 --field-trial-handle=1804,i,3297194176379949352,13100079440248057829,131072 /prefetch:12⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5068 --field-trial-handle=1804,i,3297194176379949352,13100079440248057829,131072 /prefetch:82⤵PID:904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 --field-trial-handle=1804,i,3297194176379949352,13100079440248057829,131072 /prefetch:82⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 --field-trial-handle=1804,i,3297194176379949352,13100079440248057829,131072 /prefetch:82⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 --field-trial-handle=1804,i,3297194176379949352,13100079440248057829,131072 /prefetch:82⤵PID:1892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 --field-trial-handle=1804,i,3297194176379949352,13100079440248057829,131072 /prefetch:82⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 --field-trial-handle=1804,i,3297194176379949352,13100079440248057829,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55059eeff99c9c7f06d5e8101d31617bf
SHA1b1850b541befbfcfdcd45a9a5123259ef56f7449
SHA2567eb5895e8d1fc5a31d949c43357a12298216f6b8f5760a59179c7240d73290d6
SHA5122713d63700d75c9907a1fedde1525d30cdcaebcc453fa6e802694b51b55c62c83f77b397852841565f310aac8ed3f8786f9ade4726ec4042adb9ba06c94aed47
-
Filesize
538B
MD55d73f93af35c0898b33116add5c6392d
SHA19e6aa87e3fcc28d972ae2601f133853c64e19be3
SHA2562b3ba2cbcd1f2f07995aa40d196c134c5a51dcdcfc6dc732b820473108444b54
SHA51200b13d3ba2407290337aa3146746a085799c6089b28b37d2f3e4a25c7cafcf835800647cced7e39986c4ccd60b82ea33818701affb6d2a38adfb07c7b64459e4
-
Filesize
6KB
MD520601c7df9f67b27dbcbf9d56c125146
SHA1c912b7151039f6c9c3e090c764a1cb640ad1dc93
SHA25606628d16957079dfd4b2dd44ada10cf4706a3f5dcd4277abcb8892a0507be7e1
SHA512a0d4ca6e7f444443a9df233910810e68475131aad9ff18a5f5be419ff43671eb42f105b3dd2eb8a4f51ff09013691fb6670542bd45bb21d02e05f7ac8b229fe5
-
Filesize
15KB
MD5bcaa60f17042a9fb6e71edf06447a4a0
SHA151462e35221b3a4f9af9089dd4c534cbae399e5b
SHA2561c9b69c5779d75e7a9f17951e3a6a4c7d03620556955e90515dd4b732c6c2d6b
SHA5127a13b641c87d02cf429695a3401e0a9aa7dbd238652abcaf0ed77433420093f98ccea88b7bb29ae2611b5d685b1ade12a39a982daca4454202ca317d3e808bbb
-
Filesize
146KB
MD57a94fe68788dd68888f625cd0f77ef76
SHA1f7d4ea3f71547628a5bddbab2ea7797a1f36eb0f
SHA25688d6a6174e33dacb833d4ca7f2834715fd45d94f9218238b214bee82551f2e1b
SHA512b53a1d75cd88c4ffc838212b5f8eb8d6ce5d8d28b066b6fad5983fb74b83c2702ed9bb870b34ee7c284e353e0d3e73d4531cd2f5ae1bf89d5a4522e9e8b2dc32
-
Filesize
72KB
MD562001df6281e4d12766f82c382b18d33
SHA10a312d069246f38a7d5c68c584bad31661ce4822
SHA2565cdb84d4153679422f7f2c96b94e8b033f6a7a0563cc2a67b48fc254a657dc07
SHA512960f79ad1e73f9abe76630472eba87729c43622854881bd5ab48dfcf0f3206056dd1b7206ddd6b8b00a0242760d7bc4c9861e59fb8c58e1a8a94ad0af8e0115c
-
Filesize
145KB
MD5eab26385ee0bb7d102543dd7772e529e
SHA1bfce703f6fe2c5a04f31c0a5b1d9c3fa1e7f786a
SHA2561d3454fb7745ccd4bbc62ea8f6d8e9855b556c984f60cd67d9471ed76ec72053
SHA51256eb11e74847a769559bcefe7606be9320d7f92420388c55f037e9b5ee2dd8aad5bea7a879b70b2d230d16e72c950a6c3df1a68599690371b6e23ec32e7cae67
-
Filesize
145KB
MD5b6b69eca654efdacd345f07283f8dad6
SHA115dda588a16909e199933908d349f0517344c1c9
SHA25632d6ad7a7eb1677405f4c99d06882ee152c6239b3eafe2f14462e12396147a8b
SHA512d466a39a3637a0cd1099fc18206d9dfcd916a73de7a7e790f76e8eb2b2fa8b6f034dd83a1b407e7973d60a0a632ca40b63539e7297bf3a99b685094e3434ba04
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd