Analysis
-
max time kernel
300s -
max time network
296s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2023, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
message__bc40f957_6966_278e_fa52_79fd2c1a41b0_watchmesports_com_.eml
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
message__bc40f957_6966_278e_fa52_79fd2c1a41b0_watchmesports_com_.eml
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
aa.jpg
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
aa.jpg
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
email-html-1.html
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
email-html-1.html
Resource
win10v2004-20230220-en
General
-
Target
email-html-1.html
-
Size
172KB
-
MD5
6c1e900ba6abaae8f7bc539d0f78be6c
-
SHA1
a1e2565977f2d1651d98de5b7b3964b407cd276d
-
SHA256
729a4f8907c60ff7e02e132539f0ca2af9c386a91d29c70ce2828f2bfa09b716
-
SHA512
56a7410726ffeb09015b1f2cb5e80e2be3c26d2aca799f0ca59407c12699e7bf8cc2696ab7b18a157b1e9177b76fcc6293bdc889d54a414f6ae64e74da23874c
-
SSDEEP
768:GsNmtyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyW:0g
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133240961387986124" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 3740 chrome.exe 3740 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4284 chrome.exe 4284 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4284 wrote to memory of 336 4284 chrome.exe 86 PID 4284 wrote to memory of 336 4284 chrome.exe 86 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 3976 4284 chrome.exe 87 PID 4284 wrote to memory of 5100 4284 chrome.exe 88 PID 4284 wrote to memory of 5100 4284 chrome.exe 88 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89 PID 4284 wrote to memory of 4016 4284 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" C:\Users\Admin\AppData\Local\Temp\email-html-1.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb36349758,0x7ffb36349768,0x7ffb363497782⤵PID:336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 --field-trial-handle=1812,i,246343659044179052,3462149906108332221,131072 /prefetch:22⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1812,i,246343659044179052,3462149906108332221,131072 /prefetch:82⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1812,i,246343659044179052,3462149906108332221,131072 /prefetch:82⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3124 --field-trial-handle=1812,i,246343659044179052,3462149906108332221,131072 /prefetch:12⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3116 --field-trial-handle=1812,i,246343659044179052,3462149906108332221,131072 /prefetch:12⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4740 --field-trial-handle=1812,i,246343659044179052,3462149906108332221,131072 /prefetch:82⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 --field-trial-handle=1812,i,246343659044179052,3462149906108332221,131072 /prefetch:82⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 --field-trial-handle=1812,i,246343659044179052,3462149906108332221,131072 /prefetch:82⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 --field-trial-handle=1812,i,246343659044179052,3462149906108332221,131072 /prefetch:82⤵PID:3820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1812,i,246343659044179052,3462149906108332221,131072 /prefetch:82⤵PID:708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2536 --field-trial-handle=1812,i,246343659044179052,3462149906108332221,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2376
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\1ad58545-fc03-48a1-aba7-944585df525b.tmp
Filesize6KB
MD59679ff578e71cf33502cd3f9e0f31d4c
SHA19bec2f3602696a76f181f8649566b1d483f1f984
SHA25641ac70dc5eb9fd8aa9594002084405885236daaac52ead4397538ce155f4f010
SHA512c15e20a95e539ccc5e6bb4cb11b7a1382483be9813774e30b32da435b2d8574b089da772f333b11795adbaf93290cca480aa4fd0a31dc2b23a11cce58083053e
-
Filesize
882B
MD5ae8b89d29e642bd81d4c1948fc9b884f
SHA1ed4c468707bc5ceee07e3d71c76ae49897b5872d
SHA256062386aa86a2fc64d5bebe481793d1ea96927397c0c99c2a9a1aa897ee45e0fc
SHA51218afa37935dcfce14ea71745f764c2a55e84d5b7b5b031dfa6c41bc8046f873e639cd8c306cb026c34842b4621c6ae9f4052f7d35d32dba10aef858675c26668
-
Filesize
6KB
MD568c4c07fc2d90aa67619e3bb3447e222
SHA166fce9b3b6444aa75e58addee45dcb6a3ee98fe7
SHA25622ec03ced5d7238084e40958f63ca361c52951ae4e82f04f9c79acbda450ee92
SHA512e6eb6cabce15cda93539e5631e46fdbd9bd452a36af0b08f35973270c99c4a19807f2a0bf0b7ea0d9beb0fd551f7f837ba9bf2f367da04d16602ac85de8ef121
-
Filesize
15KB
MD56396e81e7ed6ae154ba83278ff4f770a
SHA1db75d81726c9052200f0a12d32e4ac61e196513b
SHA25686ef8b3ad3f39fbd8f33e1d7076032eb74b3b7621f79708a3f44bf5d6466d626
SHA51238d5e1cddb63ec941a86fbbc75d0952aa2ceb7d426654b8275f73b0b11fdc8c01e7c72ff4775cc77bdeb5477d757b1f2a80ace85cce3bb52485e205bd81fe9ee
-
Filesize
72KB
MD564d6b2454ba021665ab95ff1cb2748c8
SHA1456eb2178b3a94efc3f3044fc6433557bafcd23f
SHA2568cb3f1f3ec03e0bdf33d19d5aefabf8407d08232406c558fe6391927a03823ff
SHA512a45352596cdcd933f55d4c7514e7336c43bba12c0cc5a26e67a9dd0b1b7bb81807fb23ee4d2eeed08192181893131ec7790fcb4404516301ef31488b3f5304f9
-
Filesize
147KB
MD541d05c301c6ea08f1f4c7dd2329ab6d9
SHA15a9145da070399636d6a2179156b3fd0197637d7
SHA256fe9083e0fee6b1cfd25eaa27378e793953d73504005123335bd5f4cf36eed2a5
SHA512bfba56028af5c3875c7712ebe9424f0b3bc50dc76a268ab80d3a1d545823629bc0b62ceabdb5395d2d630d0f3bbb5a4da89b7c66458a11b829dbc097da9d9c31
-
Filesize
146KB
MD57fe65be690710c3e6eab896b930cd084
SHA19477a45766da347fff00f500eda978b16da4403b
SHA25615deb71386d4ef9215cfd8f9225f48e22f99034ebfaee3a49202d129dfb56004
SHA512c473a8ec573551aa3a57908eca9c40eec0d84a14480db60455eda9a377a307c2d6c87402eff8221c800d0395e5c4d037cf6fe454f96d7cf0384b0e47796a4660
-
Filesize
146KB
MD5afa81cab429c3938f93fe426ccdd5b21
SHA114bc5262d7d3c24add693eada0686db0341f6abc
SHA256404207f340fec9e678b1920db4b827d904c2e84930066b135784ec76763f5f45
SHA5124dc9ce0b4e9d90ce91617dfc9e79f1dd0a2e8dc04758c4a783ba91085dc9030cd11fb5feeab2f6dd1a65484ffe2fa87c9f179a2855b30f44fcc64e18b69d166b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd