Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2023 03:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hitachipowergrids.sharepoint.com/teams/PGHV-TIDTGD/Shared Documents/General/06_Team/01_Ferienlisten/Ferienliste2023.xlsm?d=w27fde0dc0c964d228aea2135c248ee9a
Resource
win10v2004-20230221-en
General
-
Target
https://hitachipowergrids.sharepoint.com/teams/PGHV-TIDTGD/Shared Documents/General/06_Team/01_Ferienlisten/Ferienliste2023.xlsm?d=w27fde0dc0c964d228aea2135c248ee9a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133256662548263609" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3980 chrome.exe 3980 chrome.exe 3204 chrome.exe 3204 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3980 wrote to memory of 1916 3980 chrome.exe 86 PID 3980 wrote to memory of 1916 3980 chrome.exe 86 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 2336 3980 chrome.exe 87 PID 3980 wrote to memory of 4192 3980 chrome.exe 88 PID 3980 wrote to memory of 4192 3980 chrome.exe 88 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89 PID 3980 wrote to memory of 2196 3980 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" "https://hitachipowergrids.sharepoint.com/teams/PGHV-TIDTGD/Shared Documents/General/06_Team/01_Ferienlisten/Ferienliste2023.xlsm?d=w27fde0dc0c964d228aea2135c248ee9a"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe6fcf9758,0x7ffe6fcf9768,0x7ffe6fcf97782⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1824,i,5962472371432684121,17673669193337425081,131072 /prefetch:22⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1824,i,5962472371432684121,17673669193337425081,131072 /prefetch:82⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1824,i,5962472371432684121,17673669193337425081,131072 /prefetch:82⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1824,i,5962472371432684121,17673669193337425081,131072 /prefetch:12⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3200 --field-trial-handle=1824,i,5962472371432684121,17673669193337425081,131072 /prefetch:12⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4448 --field-trial-handle=1824,i,5962472371432684121,17673669193337425081,131072 /prefetch:12⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1824,i,5962472371432684121,17673669193337425081,131072 /prefetch:82⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5160 --field-trial-handle=1824,i,5962472371432684121,17673669193337425081,131072 /prefetch:82⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1824,i,5962472371432684121,17673669193337425081,131072 /prefetch:82⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5108 --field-trial-handle=1824,i,5962472371432684121,17673669193337425081,131072 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4736 --field-trial-handle=1824,i,5962472371432684121,17673669193337425081,131072 /prefetch:12⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5252 --field-trial-handle=1824,i,5962472371432684121,17673669193337425081,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3204
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD58d92e5f87f4eb5d6347d198268f4b74e
SHA1553589e8d53d39ac4b01220b3ea0afe0665bfdbc
SHA25611468e8f34fb81f838190522a30d0310fb73f5ae23bfefd238a928c8c8af441e
SHA51273b8aadaca80b5776a6205240632b64eeab2effbab6539cb2afda99c05b4a905dc58bbdbb7bcd24c852ac2e87ed2803f21ba2decb9c28ab84f75ffbf7b4ecf78
-
Filesize
1KB
MD57f0cbd7e0267b40444bfff8877472870
SHA1c83df62c33c8cf36ed48a14a0ad50a5b0442b5c5
SHA256c8018b3b20d129c7ae5e0a2dccf09434c07c30d18a9131b59adb7163b2e0158a
SHA5122accd9b81a4f5c7247633c06bbcf35eb4bcda3541c83d5d2d758967ecc203fff4650bc430cf5efad701cb943659ced4a2cbf05322c8ad5773625f5eeb5636313
-
Filesize
1KB
MD5ae1a72f725529b15cdfb0a61d753ccbe
SHA1f37d8f65a415998c6d46cc34d0d58ae2183e721e
SHA256c518ef4c7d8ad9b914d1fb56f2c0eb6f5af33c4b3236bb1d70f77cb96edac4a7
SHA51270d8b2be61cbacef6ef3a8e8161bfe1c074f31c0a8e84c52a40c7cbbe4b685677d720c256135200f7d9233dd36df7648f4e56ec79050768210f4aeec35350725
-
Filesize
874B
MD583fc778dae2913d682536fe4ed74e783
SHA198439e407af02ce506ad22071c2d90c69f80b9c7
SHA25631fbb460a27679e34f43ea24a0a4ea6e3678cce26bfb2faf596bd5f05ef5521e
SHA512951a54b1213ace73693d0dd52bf0c47ac57a603a64e520070dd838b4641efdc0dcb2504db75359e812efbcef41682a329a83c343ba36e4b15b985effb84fc456
-
Filesize
6KB
MD5d54edf071a6070dea562adedb4073334
SHA171acd7df2910373fac82836b124dcf653a5f7133
SHA25623ca76784b8034ad7d15609c7abfbcc39e1317c6596a057e7287c368d2985922
SHA512e4165ab2c438def97953399c31c90516d935743e171647536e60a186bcb0062d7168b2bd4ceceaffe92d45464db33880780936119403366e70a10a4f3149e06b
-
Filesize
15KB
MD59f35aa0f873bf597357e3aac298a7728
SHA1d795b0e2f87f75c20632cd73359031f33aa6b049
SHA2567699a08dc0ae3792f9bee36d249c30c198454639ddb79d9106d630b1ebd17c59
SHA5127b24837bb1bcc2b28eaab1d27f572e94d626d7bc3d7ccf2efe897c2072124de4b9788a6cf26eebaeae634b7be2463abbb7b6e5134bbe769e94ce8173006ec1c3
-
Filesize
199KB
MD5a25bbf78865e4cb92b7abc7f2268ef37
SHA13a76bafdc188d8c4552e5fead499ee950b954f33
SHA2564e986b01d9aea07253f1972be4d0aa46097f7eca04f71770d8f79753d376dcb7
SHA512355d3bbf42513b0327ca819a5c61f0d1f63a0141e27e644cdea9dc6f2a53733e199d3454d4d6a0413e849f64a3f7d31b2dfe1e00da52cb12f9dddcbd4d0d80c3
-
Filesize
199KB
MD5431c73e2c2386388bc9703b2df9cda3d
SHA1c8fd54b0eb72ffd63464ece1a99194414a1520be
SHA256053564e3367269ce8b86922ae9f79244c49835e011fd371064f97671fcdc3b47
SHA51242502e2c2f14e1e50a2d94239d20f8c36e5bb8e078a77c784aa742aec86bec77109472653b18cc85fea678472a8b62064d272c6f921b1cacaa6c80a82e0a7fed
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd