Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 02:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://secure.adnxs.com/seg?redir=http://wowonderscript.ga/woam/auth/4ewjsa6/[email protected]
Resource
win10v2004-20230220-en
General
-
Target
https://secure.adnxs.com/seg?redir=http://wowonderscript.ga/woam/auth/4ewjsa6/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133249708789106918" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 4276 chrome.exe 4276 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe Token: SeShutdownPrivilege 3960 chrome.exe Token: SeCreatePagefilePrivilege 3960 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe 3960 chrome.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3360 OpenWith.exe 3360 OpenWith.exe 3360 OpenWith.exe 3360 OpenWith.exe 3360 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3960 wrote to memory of 1656 3960 chrome.exe 84 PID 3960 wrote to memory of 1656 3960 chrome.exe 84 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 208 3960 chrome.exe 86 PID 3960 wrote to memory of 4284 3960 chrome.exe 87 PID 3960 wrote to memory of 4284 3960 chrome.exe 87 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88 PID 3960 wrote to memory of 4644 3960 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://secure.adnxs.com/seg?redir=http://wowonderscript.ga/woam/auth/4ewjsa6/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff96639758,0x7fff96639768,0x7fff966397782⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1832,i,11008261273895955389,6739255061563542154,131072 /prefetch:22⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1832,i,11008261273895955389,6739255061563542154,131072 /prefetch:82⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1832,i,11008261273895955389,6739255061563542154,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1832,i,11008261273895955389,6739255061563542154,131072 /prefetch:12⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3180 --field-trial-handle=1832,i,11008261273895955389,6739255061563542154,131072 /prefetch:12⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2936 --field-trial-handle=1832,i,11008261273895955389,6739255061563542154,131072 /prefetch:12⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4768 --field-trial-handle=1832,i,11008261273895955389,6739255061563542154,131072 /prefetch:82⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 --field-trial-handle=1832,i,11008261273895955389,6739255061563542154,131072 /prefetch:82⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4776 --field-trial-handle=1832,i,11008261273895955389,6739255061563542154,131072 /prefetch:82⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4824 --field-trial-handle=1832,i,11008261273895955389,6739255061563542154,131072 /prefetch:12⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 --field-trial-handle=1832,i,11008261273895955389,6739255061563542154,131072 /prefetch:82⤵PID:3764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1832,i,11008261273895955389,6739255061563542154,131072 /prefetch:82⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 --field-trial-handle=1832,i,11008261273895955389,6739255061563542154,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3824
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
882B
MD5a0fb82618c07879b71e6f571b5a39209
SHA14c135679e5ee9a7b3aa82b49b333f98b19151732
SHA256eb2961e33b3b4cb28fb09ef9df766f266d1e4cbd904c4bd5cb0e2969b04944c2
SHA512a72d90f85457507d33f468cc1cc0047461a1169e274ace852feda3979a3c15856092492dec060c2b6a786c5f545dd8449cbfe906fe6a896a6010ba7e9caaeae8
-
Filesize
6KB
MD50c4616f1f5058639de57a8876e0741ee
SHA128848e3e16f93d48425cb33de8ea6c5b6d704792
SHA25664d0304948b544b245228cc62732ca3ca2795ebe79cb5ce19dce86c059e2f4bc
SHA512967a3822518e7ca97a419c2fcf394b90c35a7fd40431a882d314f90d9bcee92edf008174d80b259b18a7e50bb0aa8d95a7b2fb14ede5a9cdd3ab2dc0d9811124
-
Filesize
15KB
MD5ea66e67f068d0f3580dfacbb7f74f9ec
SHA12c456e62f6dd4f8d789c4b02653217e0a587f0c8
SHA2560056dcf871024252054eacbe040ef0e40fae36c10234438a12cf581fe8f37692
SHA512ae5939a27fd7b457a55b3c591c03218ad4b95fabec38705b02472a72e0d850868d29a830eade3b2620834f0ead2cdbba8e32f054ec6b824b21a7efa231fe3ab4
-
Filesize
175KB
MD5bf7c1b66937e70387222f25b6875ffcc
SHA113a036967fe8ccce44fac5515babae7383f35773
SHA256c494ea5104edf6975a86e90666504f5025b8674a5500ade0f910f826d035813a
SHA512b0e8a40f50a2a604d44d7075a217f27ac2d26ec2acc88d7b87036509d2628c4c3e82fe268101ed309bcb6818face22f94416336abbea635d25d85d4474db75ae
-
Filesize
72KB
MD5c9ec2a471ddc7bb9d3b8a37ee95ef8b9
SHA1d818d71201952b0bc40b3bd40a620fa4452f4da9
SHA2563c70bd55d76d1b722e7c8d61a145bfd0c3c019bf4aab6b5d053298cdac5dbe39
SHA5129d130812a277ec9b181d9ec9b71925e84ff05b07b5c3799f61ef4c2eafe691cc98f9ff71461beba592caa2b4dcaa0cef6b9dca7955f141281a44135d6226d234
-
Filesize
175KB
MD53ef60502dace56cee741ab185cb7ad75
SHA1fb224d319849edd4695c0139b7a9f9f609d4e69a
SHA2567ce95795700c0ebc403bb739782cf2e419f4f803f675100928fbe533dd329f98
SHA512ed50751331e0bb2424e5ed912095d59ad808fb25c2aabe7776c732114dc924f4379d65924fe301227e40f18c631ddcbe8392a97baea8cb503916a21397d67a50
-
Filesize
176KB
MD53e498a8d39553fb49d7acc14f8e371bd
SHA12a16841d765d5108568aeffac1af625f1eca870e
SHA256cb049aac49d4062b5b4f33111ea22faa3bf0f562bb0f750a562c7ab54e26cb02
SHA512b269520f175cf2231f02a9996c13c694dd7458dd8883ce21f33a89c1a60063efe32fbc736734a84f0e86e20f60ed7ef5a3079bd583baddd5466bf11ee1d696a9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd