Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10/06/2023, 11:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.mentoringcomplete.com
Resource
win10-20230220-en
General
-
Target
http://www.mentoringcomplete.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133308705664231761" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 796 chrome.exe 796 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2904 2900 chrome.exe 66 PID 2900 wrote to memory of 2904 2900 chrome.exe 66 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 1508 2900 chrome.exe 68 PID 2900 wrote to memory of 4000 2900 chrome.exe 69 PID 2900 wrote to memory of 4000 2900 chrome.exe 69 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70 PID 2900 wrote to memory of 372 2900 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://www.mentoringcomplete.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffdb6189758,0x7ffdb6189768,0x7ffdb61897782⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1820,i,5872788568362867775,17358202465897666239,131072 /prefetch:22⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1704 --field-trial-handle=1820,i,5872788568362867775,17358202465897666239,131072 /prefetch:82⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1700 --field-trial-handle=1820,i,5872788568362867775,17358202465897666239,131072 /prefetch:82⤵PID:372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2736 --field-trial-handle=1820,i,5872788568362867775,17358202465897666239,131072 /prefetch:12⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2752 --field-trial-handle=1820,i,5872788568362867775,17358202465897666239,131072 /prefetch:12⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4404 --field-trial-handle=1820,i,5872788568362867775,17358202465897666239,131072 /prefetch:12⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3356 --field-trial-handle=1820,i,5872788568362867775,17358202465897666239,131072 /prefetch:12⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4596 --field-trial-handle=1820,i,5872788568362867775,17358202465897666239,131072 /prefetch:12⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 --field-trial-handle=1820,i,5872788568362867775,17358202465897666239,131072 /prefetch:82⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 --field-trial-handle=1820,i,5872788568362867775,17358202465897666239,131072 /prefetch:82⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2520 --field-trial-handle=1820,i,5872788568362867775,17358202465897666239,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:796
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4840
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
1KB
MD51163fc6b6b3c82f79c5aeb3b8e60fa90
SHA1de71c2a8379742de169d13fddf42886975676808
SHA256d22f620797349588f9d6c595c0d48089d18b9b470b6672ea7ab690688ed3d030
SHA5123287a9ea031fe12bbae28ea29bc75f3f46d12f533304e9913d95d9ed71d928a15d29383e5c9cc6fca4558717b01a8223540fcb1f6b120a118b03f638ee11c9d8
-
Filesize
1KB
MD5a2fb99b977e45dd622e903351d422f02
SHA151b100647d16bd4d5dd6454684969786887340bf
SHA2566ea2ab3ec2aea2e435da952291c5c6296e7de7cfbd709e94b128fca8d9fcc7a5
SHA512406146bcb05fd1dffa04a5a5e0389d617756e0855d7973a9ea756951f5eae76311c1026b137d2b31d06f88f4f3cc2dc76d2b05d27608245f2ac95f4c5c00ee0d
-
Filesize
3KB
MD58ed9ba0e2a5ecb5707dc183a1e8c37d7
SHA14b326e940a06c2daf58469b5d846609bc8f863be
SHA25639f92cc17fcb26bc2e7c5f0b05265b2204e0159bf43c255047bf2b1c8941c28c
SHA512aadba061481888a714e15956c450608d904fec8c9b4c26b6ba4ec61f6c8f0a56d2ad5d9b3295108316fc93315ef07a5109b94a3064115ceefec6d040e762b10e
-
Filesize
1KB
MD55da1e4309f443446048714a199afa7a3
SHA1e3f1d401f02e6eae392af06821a2d513b042e51b
SHA256f339e4a15c99bcfe44a45c3f999697a6af8abb872a3c5ac9553b86f8f3989a5c
SHA5124ce4f357f223b65a41258c7994ec2627855d493a36c996c89fa646e47b3d141f623d9ca89bab4facba63e3708202805f833d7d9119d019163b16800402b399e4
-
Filesize
1KB
MD5caf3e89c3415efd8225b231e740ab08e
SHA12f49f934ffc5589d5655777c0c5115ac116fa14f
SHA256749a152e1f00d4e14cd67f66acd7a6c6e70361a8e3b267e90b71f5d6916cb726
SHA512d4e7626dac9820125c471f682dad01c64a1ed5c9d1ea651a0107ff15ece5e2dd171bdc1713c5bdfff5d313884fd31160be929bb8c168a90274a802cc0d0be65b
-
Filesize
5KB
MD53f9ce36b33ea7d8adffea164cc7770c4
SHA1c12052ddc6af16f4f049f1106d265c7cc22de308
SHA25654f0222ff6b10346200e6d79a2176b4a8ef8db61fac0785e7a9f97777c5b31d7
SHA512160e743bd619e9cbc128bfe22e0f6dd27a5f27c1307d8ad98cc77a29c22099e169b87c31c8b1d7af74fdefccff6de68b3e19d814b7a1e28fdd6a11f181a561e0
-
Filesize
5KB
MD5b730e2937a8a6199a7c056681e3bbc52
SHA1bfc1d4eae8031531bc2068aa7f50b9382e75c667
SHA256aa3a1a5b3a5b208c14822350ebf9e2583abcbc92bd5bf95154124e3512f6736e
SHA51256c18e7e28dbe2a87ef028c389fb6434a2d73a2205388fbbb98d734b8401d4ec249721f31f89cfe4fed990c83712f38ccea657c9b468079b3d471db480f4a00d
-
Filesize
5KB
MD5319e27a56fe306d57dfd6c641bb60304
SHA1a248c57cbe2e6b9a1fc9414e926a8b1243ebbd5a
SHA2567be5036e10bf00686482f5c65fe55249d1af3f640dcbcf215fbed5f0908bfd8d
SHA512f1fa7c6e052443c4d3edf588e9b8b90f027492f07f321e8e0d990ca57e2bf80ce56b9d348b60e618b99ebfed07ff306cb20c3d32b9fa2fa5cf70988f685ea424
-
Filesize
6KB
MD508b1bfd7385846f4da6b4e5167aba543
SHA1e456468396d63f5c6bb3ed204d3bea0131e5fcba
SHA256e9d327ed0d03dcae796fb1eab975223d7908cb5c33a0d1d963d1b8e55d92eea0
SHA512ba8e97748ba1230789a90d58ac60606d9130faa7dae094c84807721a99e3adf3b2bcefe0ab8ed6b7561742f00950eddc8dffe05b25f3a63750926d3a45d91b7a
-
Filesize
158KB
MD58f04cf140ac1b2847faeba2c9c82efc6
SHA132fa9bd5fdba1b851bb302f06ca6940354a32154
SHA256efbbb8ba3ab701ae0980be3c50fdfedde139d886b505bea25128456829852af3
SHA5127247d9c62ba9e300960d865d4dcbd5d321425c17586575aa1d931c383058d2fa5483d1b0d3d4c2627b61a15e77bbde3e0667ec82c31e8f4b8d9f0dd7cfcb9e55