Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2023 08:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://chipotle.app.link/?$3p=e_et&$fallback_url=https%3A%2F%2Fclec-unr.com%2Fpop%2Fjuj%2FfvEbAdrrCa6hGG3%2FbWFydHluLnB1dHRpY2tAcjMuY29t
Resource
win10v2004-20230703-en
General
-
Target
https://chipotle.app.link/?$3p=e_et&$fallback_url=https%3A%2F%2Fclec-unr.com%2Fpop%2Fjuj%2FfvEbAdrrCa6hGG3%2FbWFydHluLnB1dHRpY2tAcjMuY29t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133336235030355567" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 4132 chrome.exe 4132 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4380 wrote to memory of 3476 4380 chrome.exe 83 PID 4380 wrote to memory of 3476 4380 chrome.exe 83 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 2708 4380 chrome.exe 86 PID 4380 wrote to memory of 3304 4380 chrome.exe 88 PID 4380 wrote to memory of 3304 4380 chrome.exe 88 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87 PID 4380 wrote to memory of 3736 4380 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://chipotle.app.link/?$3p=e_et&$fallback_url=https%3A%2F%2Fclec-unr.com%2Fpop%2Fjuj%2FfvEbAdrrCa6hGG3%2FbWFydHluLnB1dHRpY2tAcjMuY29t1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffc38cf9758,0x7ffc38cf9768,0x7ffc38cf97782⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1912,i,12751563395357911610,10190635524267925233,131072 /prefetch:22⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1912,i,12751563395357911610,10190635524267925233,131072 /prefetch:82⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1912,i,12751563395357911610,10190635524267925233,131072 /prefetch:82⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1912,i,12751563395357911610,10190635524267925233,131072 /prefetch:12⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1912,i,12751563395357911610,10190635524267925233,131072 /prefetch:12⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4880 --field-trial-handle=1912,i,12751563395357911610,10190635524267925233,131072 /prefetch:12⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4848 --field-trial-handle=1912,i,12751563395357911610,10190635524267925233,131072 /prefetch:12⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3140 --field-trial-handle=1912,i,12751563395357911610,10190635524267925233,131072 /prefetch:12⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 --field-trial-handle=1912,i,12751563395357911610,10190635524267925233,131072 /prefetch:82⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5476 --field-trial-handle=1912,i,12751563395357911610,10190635524267925233,131072 /prefetch:82⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 --field-trial-handle=1912,i,12751563395357911610,10190635524267925233,131072 /prefetch:82⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3616 --field-trial-handle=1912,i,12751563395357911610,10190635524267925233,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4132
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5530779740f068cbd22bf4fccce469731
SHA18f156982d84320a88745e74dbd58077fdd193d32
SHA256463c29a26def6a2599d6b4b0532d128d0845d7522f265e75606735dc7cda2f37
SHA512179bfc4f143b45377af5aa45ab169ab27ce03f3ea77071c737e0f4752a6e06686206eb521629e5a28a64967c81b5970b2b6c74e274ae1946ab6f1079c8eb655a
-
Filesize
2KB
MD5bd753e23362d70d240f326e93457ac15
SHA164fc68dd161c31a51b63975a6c3e9d25a7a15cfc
SHA256a3f763aad967761362df90a7f35eea6bf45f3888d6339583e5e7b52e7a886804
SHA512a5f0a2e7c2fd688c6e72b645a60c89f5431de9abd7b89d0571c9e407d2999f3d38be7641b5ba68e51df96b96df4bbe8810803e6054f272e77024fdb5e70ecf04
-
Filesize
1KB
MD506ec6787a9d127a7b43a6fee9e1fb887
SHA185ac79b5b3940a0d0be6355c614e6faa1408e4f4
SHA256bdd73db7ab4d6537060c23eb40be922d7d104b739108d24d9f8ed74d1c9c952b
SHA512926e0367a9005342829aa10a4792cfb45aa423731431e40d0dd711cd5b8a90d707139817006ce96d023148b8cdc341d4f0625998b00e05d9c545efc3f8e4d58c
-
Filesize
705B
MD5c5f21cdb6eaa65b060aadcf96e8e2df9
SHA1f313390778d0e4bea8204bd5860134f068be9c78
SHA2561639f3a9dea0bc60fd276d8d7cd981132ca1d90012d5a36a84463d7480515d4e
SHA512dd29535f8821a48f24f52e2261c4ff568c94a075a263dc4d180e8e402443b53978e738b851b6ce110f65fdfaa3b129518a8df517428c0e5d596b7688f542194e
-
Filesize
6KB
MD5ab0ac8119db06406790455322fba9417
SHA152988bb7e2cc9f888efdcb49fdc95ac21f9a42df
SHA256740e4aea145e29b8bc9e25e6f504d3160f9c348c33f445b29b0bc2ac637deb40
SHA512bd3334c2582b7d26bafd8ade68c61389dc2668400bf53f10e662e5d3374fe5a5f021b7792a1018c3b551cd1f59a9e5a06f9bd798110eed7fa3146af662ec4927
-
Filesize
6KB
MD543b88c99bd6e0884d68c2e4857a463f7
SHA1be7d73aaa0abe2540fbe7fa117f2882b24d2a538
SHA256dcfc8e095592554ec633735afe51c9309df8839e9b9d946cc621f72c176c8951
SHA5128d92403baff8bceceac0a666aa0ab3deba78d5dcac3b015478933d2d1c7b57fa29cb30839be00bd8f6bfe5cf40ca6359e2d8d2b979fcb310f76e6ef6ea76db9e
-
Filesize
15KB
MD5021a0ee05172a981a177fb57c32c5f67
SHA18def35355ceab80976f9fd2efd1d05c848d7b351
SHA256fbfa990c557c5f6cff540340988f287640796a6bfe112486ec28430736b51819
SHA512f7af4a6f8cb3e82d58355ae6e7b93c915c284dfef5bd564b27c0f80df1a53adf35d9a4bd51c4f7b4513b7d0e9092e5862ceebee096a8dfeeec125eeba61ea94e
-
Filesize
173KB
MD5fa178160764c1b3d1d442a4d6afe2f77
SHA1517317de27c0fb00e06a304b56072e79f3c634b7
SHA2566c73c465f0ac8d00fb95b0d849bb4df32eb92c716252ba29f7a37ee68730533a
SHA512a828104feccb721b6805fc23b253bb89236e2a7b41db37637739b6d7c2f189dc241ac004bbdf9bd0a12ff1e1d01fc1b2fb44f2ed98fe741806effed5d043bf59
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd