Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2023 14:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bit.ly/40BjxJL
Resource
win10v2004-20230220-en
General
-
Target
https://bit.ly/40BjxJL
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{05F9F78F-8E91-4150-9A4E-5DA0977DE967}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{5D9E7A4E-051C-409D-9A4E-FFD4D1BE7907}.catalogItem svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133266557323634696" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4892 chrome.exe 4892 chrome.exe 1092 chrome.exe 1092 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4892 wrote to memory of 1960 4892 chrome.exe 76 PID 4892 wrote to memory of 1960 4892 chrome.exe 76 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4760 4892 chrome.exe 84 PID 4892 wrote to memory of 4052 4892 chrome.exe 85 PID 4892 wrote to memory of 4052 4892 chrome.exe 85 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 PID 4892 wrote to memory of 4904 4892 chrome.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://bit.ly/40BjxJL1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce86b9758,0x7ffce86b9768,0x7ffce86b97782⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1792,i,16938817188896185624,12662739815779530889,131072 /prefetch:22⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1792,i,16938817188896185624,12662739815779530889,131072 /prefetch:82⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2144 --field-trial-handle=1792,i,16938817188896185624,12662739815779530889,131072 /prefetch:82⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1792,i,16938817188896185624,12662739815779530889,131072 /prefetch:12⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1792,i,16938817188896185624,12662739815779530889,131072 /prefetch:12⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4800 --field-trial-handle=1792,i,16938817188896185624,12662739815779530889,131072 /prefetch:12⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 --field-trial-handle=1792,i,16938817188896185624,12662739815779530889,131072 /prefetch:82⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3348 --field-trial-handle=1792,i,16938817188896185624,12662739815779530889,131072 /prefetch:82⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4672 --field-trial-handle=1792,i,16938817188896185624,12662739815779530889,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1092
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:5080
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\1c8143e2-d03c-47c0-960a-b4a935340416.tmp
Filesize4KB
MD50797ea2e43b8d434f63e3750b9b3c4a8
SHA1bbf236b0b34728248b085777d5ac3a6855b0ce1d
SHA256ac5d3bbb4e56eed1323fa313dd67db34815c3649a144df63d9ea010b68f6f418
SHA5128aad5a836f29f251d83b7f44a171099e205355c81ea69a848a40fa4231c689a040f321fdb4e79c0c20a2cc657eb14cf48d74f84f62e931059a291a1aa1461ca8
-
Filesize
648B
MD51f45ecb63dea6523d370c5b6434a54f0
SHA126b437497fa6f29133c3290af2327177641801a5
SHA256e7cd9f33c994109892418394568695c2532532a26074007d8a5235c939ca2a96
SHA5123cb20104b83e18234aa9ef8fe4254934b4660c7e975924a2f9a68d5adeefeca8748baf1224f5178418bf25bd91bad1021042745af52ce0e58b11fa3507efc5f5
-
Filesize
1KB
MD5b41293672d7e1889fda740f3172dde3e
SHA1f7e6b1d68a8e90b8751124ebbd91024ad1da1fbe
SHA2561e076cea01ce02ffdba3f97ef9592a6ccd075585ef205c4d051f977438b4c77e
SHA5126c077cf329a00ea1a0c3d2438c8fb87dceefeea28ec5b49debcbbca7be6810b061eee9682f886458a98d2a4c79feca83a21f8491f3bba2e225423825ad338147
-
Filesize
1KB
MD559a7f1ac2f0118efecbc04f4e7642886
SHA1f7e8beeb92b76180a8daf4b8e84c3450c94b8e16
SHA256932c0992398c20dd5f02f67b1f2e0ec3782a10d271cb5c4a2106d76579882c5a
SHA5129ee40976512b44e09ed23c6704c8c38433d6ed12c2b6efa6c41d80d064e203ef64a678d9ef36cfc8af34fa42829eaffb23ab65e7989e6151dca8ea7a1f22dc21
-
Filesize
874B
MD5991208c00612fe6e0d8e13c2f5254fcc
SHA1c52e811aad115b0536508d53857296bf9a3e6dd0
SHA256fd55374d26fcf92ee74b138622be00757165004cd5a0d4dc11ba75a038c4b6ab
SHA51280c6ece4d8ea76a1c93fad876078d3c28140687fc71e05579bd46937c4aea224b95706ce993606d9de37261aaf0fb2a48e2770b4e1a7c7bfcd62cfd8d6aa5dc9
-
Filesize
1KB
MD5ac90a116091461720b8f91ca1bcbd9ba
SHA100660847b7d5ddca10bb0283f8ede1837815b30a
SHA2567073dd1670e29a8a76bc05e30cc262ea1a8c2f07c6424dbd7bb32d207cd6efb4
SHA51246ef630fc6954eb4b29b2f3af59dff48a09922920149beabdbddc94fb7345d7d72c498ab4dcc1db76e6ab49c641d76c801c253c813be630070784b83caf7bdf3
-
Filesize
4KB
MD50e8324293ee52e39f92526474b17f77a
SHA1c106795e67b1c4f006c23c2087999b87aa5b95c6
SHA256970bfb1e675eac61ecbad249b1181be4bc727373b012e3938f7afb01100fd976
SHA512f6b643d8f3155ffd815d560a1611914a20f8dc7e15d765d42153a8ab5d67bf2b5073c77dca872a0b8b179be93af87a624e7aabbea27e960d72b97d5c77abd340
-
Filesize
4KB
MD542083a4c841091659733a9288ed99af0
SHA1b91c9f05d4be12f97e3da9c0ca25b54de1edfccf
SHA256328b0dc6cdd7e1603d66e58c7f984b4bf8abf8ec3d5151e898bb68a5ec1c1ace
SHA51295955f12bfca85508cfb91a2d8ba0fcba1220cf13834f4453edd8bb364e2c67c0094ce9359a818591e3d380d56b0dc051121cf0a64dac2a2475cdb51fb0e04db
-
Filesize
4KB
MD59b22705268511f342a88b45cb626d46c
SHA1f5546ec15f0ec9c367ec9d04c12ba04d969fc73e
SHA256164820dcca8f45c7ab56d2c7c337bb845dd0fb657b5ef6219b28200d5da3e1a1
SHA512c407e779880d52057db25f3e3100e991da84897e9dbe1c1cba65731bd4505f0e83788d23de2fce89cb0cc667e5cfddb6fd65636ecb71f19c3a32c24cd8c772ae
-
Filesize
200KB
MD538c2b09eca83541127c8f9ccb7a34535
SHA1b25506037addfe0c39418adbac4134f282c10656
SHA25633dea75c87fa402693d12bb20e7f5b8532412ea1d1211e14ecb436765f289690
SHA512539461ee51eb0df69676ffd45717faa7cb027118d9e3375aa5e810726722126567e99d5125876573b51f490910546bf2eef158147f701f168d2104f2e2226060