Analysis
-
max time kernel
152s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2023 12:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://xc-i-gldev01d.corp.hitachi-powergrids.com:44301/sap/bc/ui2/flp?sap-client=300&sap-language=EN#ChangeRecord-displayInbox?allItems=true&showAdditionalAttributes=true&sap-fiori-id=F2097&sap-ach=PLM-CR
Resource
win10v2004-20230221-en
General
-
Target
https://xc-i-gldev01d.corp.hitachi-powergrids.com:44301/sap/bc/ui2/flp?sap-client=300&sap-language=EN#ChangeRecord-displayInbox?allItems=true&showAdditionalAttributes=true&sap-fiori-id=F2097&sap-ach=PLM-CR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133266478313210930" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1804 chrome.exe 1804 chrome.exe 2252 chrome.exe 2252 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1804 wrote to memory of 4184 1804 chrome.exe 85 PID 1804 wrote to memory of 4184 1804 chrome.exe 85 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 3940 1804 chrome.exe 86 PID 1804 wrote to memory of 4996 1804 chrome.exe 87 PID 1804 wrote to memory of 4996 1804 chrome.exe 87 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88 PID 1804 wrote to memory of 2712 1804 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://xc-i-gldev01d.corp.hitachi-powergrids.com:44301/sap/bc/ui2/flp?sap-client=300&sap-language=EN#ChangeRecord-displayInbox?allItems=true&showAdditionalAttributes=true&sap-fiori-id=F2097&sap-ach=PLM-CR1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd24939758,0x7ffd24939768,0x7ffd249397782⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1812,i,6660279412867297913,6769951265957400090,131072 /prefetch:22⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1812,i,6660279412867297913,6769951265957400090,131072 /prefetch:82⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1812,i,6660279412867297913,6769951265957400090,131072 /prefetch:82⤵PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3208 --field-trial-handle=1812,i,6660279412867297913,6769951265957400090,131072 /prefetch:12⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3224 --field-trial-handle=1812,i,6660279412867297913,6769951265957400090,131072 /prefetch:12⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4000 --field-trial-handle=1812,i,6660279412867297913,6769951265957400090,131072 /prefetch:12⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3376 --field-trial-handle=1812,i,6660279412867297913,6769951265957400090,131072 /prefetch:12⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4864 --field-trial-handle=1812,i,6660279412867297913,6769951265957400090,131072 /prefetch:82⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4032 --field-trial-handle=1812,i,6660279412867297913,6769951265957400090,131072 /prefetch:82⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 --field-trial-handle=1812,i,6660279412867297913,6769951265957400090,131072 /prefetch:82⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5000 --field-trial-handle=1812,i,6660279412867297913,6769951265957400090,131072 /prefetch:12⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2792 --field-trial-handle=1812,i,6660279412867297913,6769951265957400090,131072 /prefetch:12⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2856 --field-trial-handle=1812,i,6660279412867297913,6769951265957400090,131072 /prefetch:12⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1812,i,6660279412867297913,6769951265957400090,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
882B
MD56f9dbab05cd99bc21dd8be9688fe3609
SHA11b87cb81ff6c3cde1ab2dd0359dc6fd2ff8ffaab
SHA25675744266922248f6e64e2975843b7685f5ecce40289f994380f14d08cf73d32a
SHA5122378e3479f9d3ec60e0bf7ef7a18c3d4e6ed91194981de61348592bfb167b1bd80b34142419a4d2bbfe33817c30b7bf6fc1fe18e2bee76a41e51917559f6ce69
-
Filesize
6KB
MD56cc85a649e727825ef2457ae476fa7f1
SHA13d6f754c3d21d13eb8059253420e46ae5ad36808
SHA2569725fb21f6a631546fc5d339f5323967f0a0c83d446186b1fcda869a168eb5ae
SHA512c3ddda80c1cb23120d40bb6718375685b1c33c314621616d91b82fd21ae64a8d61397f3bde28ee179c9a78f4a361250cad82754564b66aaae1ac8f0edc387b8d
-
Filesize
15KB
MD51774d081921a0305c55c569f4bb21059
SHA1a92f813806d1c674f67521eec3e3e097982cc9bf
SHA2567ec5ef4812ad6f8c5ff103ab952a79557b1f5856b23749c27f07c9b612602593
SHA512fa3383a4d99fa3bb7f148dd4e16595e51c9b497d8919d4eb60cbd1d43936d8ea416430c82664734e1d0b80c5a13c0cfef342298807c2723da84fef2afa6237c2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\fb2675e7-b658-4999-a080-ac241d1d64fd.tmp
Filesize6KB
MD5c4d3092a1d7c6f331a063e46ce7b6cd7
SHA1f03426ea32242e35c47b3b36732f6b55af410246
SHA256eded3296b2fbc88471553dc6bf1f0738792cd5a02f6a34cdd6b56103d3c16bba
SHA51228ee1c9efa5248b2384674d95aee9877b7c34c810e8578009ebaa4b8472908120234f561979ff09d2c8b75dbb8baff4ffcf54dd59d45eec658519a7cf5368b82
-
Filesize
200KB
MD5d0cebaf81921ff70bf53cfdd8ed670dc
SHA1cb2c651de64ec101811b68c1db204c6afbc4a6cf
SHA256e77466b3280472f6376b318c715c1378d77e0442fff7310093452f1e396f798b
SHA51213b1d087d26089fb256a74d5301b80141a358e0321b874aabf57f0a5987374053fb06a1ff25434997cf3ef0d6b73b664bf06da357d590ea25f168d1a65c2e19d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd