Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
290s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21/03/2023, 18:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://brandequity.economictimes.indiatimes.com/etl.php?url=https://brothers-company.com//rt/test/[email protected]
Resource
win10-20230220-en
General
-
Target
https://brandequity.economictimes.indiatimes.com/etl.php?url=https://brothers-company.com//rt/test/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133239018098183984" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 2296 chrome.exe 2296 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 8 wrote to memory of 4536 8 chrome.exe 66 PID 8 wrote to memory of 4536 8 chrome.exe 66 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 3060 8 chrome.exe 69 PID 8 wrote to memory of 4836 8 chrome.exe 68 PID 8 wrote to memory of 4836 8 chrome.exe 68 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70 PID 8 wrote to memory of 4812 8 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://brandequity.economictimes.indiatimes.com/etl.php?url=https://brothers-company.com//rt/test/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffeb75a9758,0x7ffeb75a9768,0x7ffeb75a97782⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1796 --field-trial-handle=1760,i,4031302921761087130,10628749238863730385,131072 /prefetch:82⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1760,i,4031302921761087130,10628749238863730385,131072 /prefetch:22⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1760,i,4031302921761087130,10628749238863730385,131072 /prefetch:82⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1760,i,4031302921761087130,10628749238863730385,131072 /prefetch:12⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1760,i,4031302921761087130,10628749238863730385,131072 /prefetch:12⤵PID:4144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4644 --field-trial-handle=1760,i,4031302921761087130,10628749238863730385,131072 /prefetch:12⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4764 --field-trial-handle=1760,i,4031302921761087130,10628749238863730385,131072 /prefetch:12⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3076 --field-trial-handle=1760,i,4031302921761087130,10628749238863730385,131072 /prefetch:82⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1760,i,4031302921761087130,10628749238863730385,131072 /prefetch:82⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 --field-trial-handle=1760,i,4031302921761087130,10628749238863730385,131072 /prefetch:82⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3268 --field-trial-handle=1760,i,4031302921761087130,10628749238863730385,131072 /prefetch:82⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3872 --field-trial-handle=1760,i,4031302921761087130,10628749238863730385,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1804
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD546054c39f88398197a2d38e8587487ed
SHA17597557ba3f9e63b2781d2b37864604d7d19fd82
SHA2567030e8bb154f3bac97ef6256fa7fb42b76c9ea4adcb06a0f1bc487f45828d13d
SHA512e919044f13c2a10177b3964a9e56d953e7a542f426cbdbc9dbd23d4562cae39389e2b0a0e4f6143b01fb569f2948d95a1abe26aca8ed2d25c932648f722a2b2f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\478bd545-7aa8-4bdc-bc89-a27dc51b75fa.tmp
Filesize1KB
MD5854f63b00ce8fb89ee01ac1b4a383c74
SHA134781ad989b671b40ae747d2983d20577703e2cd
SHA256671b4f29b2d0cae885c22871c95f96eb839b1f96ff57358b547d7841ce659cdb
SHA51239393bb2ba33af36955c45fe0c4dc751b5c7875b08246111f74afe97fa4e2e7788982c0c68ecf99ed63b63a0fa1362963980b6edbc6352e41bfa45b189f73538
-
Filesize
2KB
MD58c30b05098610e1f862363342bc8da07
SHA176b4c7aa638fb20ed4dd7526b1fcfb28e18354b9
SHA256bf3ad83757373fb8a00d67f2f2f33d7a02eee89a418ddb0ba5dd0f9724d1eccd
SHA5122463a58559054621b45ce1ac4355971484c8c7803c99290c651aadb681cbc0d1ef3b42a171685ff216bd8cf51f937ce2082f3cf9d79f1276d835e708dd98b655
-
Filesize
6KB
MD59009112c74344bf829b9d635ed7d3809
SHA1c06035e3f8a1f4052a43ab4afda7cb4ed0d0f369
SHA256156f56a37ef62fb368b867aad089561bf84bc13136ec982e2140bc2d1c833d8b
SHA51210b17f079cce312d2defc436b91ea236217cbd534d601c80c14fa3e8f09d3d6cf5468aeb84380f05c0fe88789ff51e646005823a8760cef9c7e610280b2e8349
-
Filesize
6KB
MD54f1e04318c2b3cb45c8de5769b69798a
SHA1332252ad7d15859096ed27d8f0699d5b74ab454a
SHA25646a186704f5e9b15f2858e27673cfafa910d99e238a669919529a0a01da1c300
SHA51234f6c716594e4c3168cb5a1b0d1a332234e24eaf84b65d58ecc73fa21630cc83ae073c607b157911d1caf9f6253cefcd81ffb69654fc6e679e7f9c79fddc8bb8
-
Filesize
6KB
MD5ac8c6bea83825bdbb513430668afb81b
SHA188fe31de0cf0eab001eb77681cb6080319951f18
SHA2561228b802bf8587460fc8fe4551b3fbd022196cb7b329aee5323f8bd89ee04620
SHA512701bfefd0392e75a69f2b417b75445b19d80d13599787e374b9ec1aa75835c9f997746eadd579071f964b9b2e0f621497be4feb099a8edafcbdd3d40a281e1a5
-
Filesize
146KB
MD5bee6b97a1276adc9918ed04504d7da1e
SHA106b0992f23d421b37c5f60931371a03f4a950ec8
SHA2562dcef95c6135768ae7a71615500dd7fd672932669cceea7602242d13f51870fa
SHA5123e474b7e9a12a78c0437e7ccf15cb6f0e6464cd8fe644937aefa7d537ddc7e1d74e116c0186bf36a9b698eec10241f89f4c7b0f795d5a069f21a5907f88ae332
-
Filesize
145KB
MD5b65a03ba955ad95c8dcfed31deaaf274
SHA195561c8a4080442f7edb83b24c61e777521daeec
SHA25642657b3b766655a0f60fa763f8371353f836c99f1ab2918f3981883216e97114
SHA512c30bfeeb5634e3e2b82035e41e410f872299bdcb21ac8c1607691c4af042b9d11798175fa13e1c9b0a6d282a3aa92780376c30c26c4b22e9f0efb6ad6317752c
-
Filesize
145KB
MD5629ab99dfe719f858bcf94de3760a7c4
SHA17b47af0a949be41853c208c1f002792a596c421c
SHA2562ec08f859f6cd03c4b6d7900dd274dc73f1174d6ed03e0dec78e351095982a07
SHA512ca94c54a646f4a4f83abd1d451209bfc7758d63494f9d5737796b50682b3bb48fd7fd6297a25ed359871643d373fa9a97316a8fe0adb22234e00d6043cf06bfb
-
Filesize
72KB
MD5c2243d6d62bf2bb640ac7365bf813655
SHA18e556b71843181680b9bff0eb3ff3a5b8a16c94d
SHA2564573ab2f5e3d8324165abdff82a50b3345807a63fe068e6e10e6ba9475a90d04
SHA512b61b935f42165a5a91d1710ef95a8b9fc9dc0baa495df9648c4683fcf7c0dbd32196c497d40c4cb1e8ad15cb79811119faad870731780c43026dd99c5517c6d3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd