Analysis
-
max time kernel
1800s -
max time network
1691s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2023, 13:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://sadasdasdfa
Resource
win10v2004-20230703-en
General
-
Target
http://sadasdasdfa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133343359389668055" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1512 chrome.exe 1512 chrome.exe 840 chrome.exe 840 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe Token: SeShutdownPrivilege 1512 chrome.exe Token: SeCreatePagefilePrivilege 1512 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1512 wrote to memory of 3040 1512 chrome.exe 84 PID 1512 wrote to memory of 3040 1512 chrome.exe 84 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 3612 1512 chrome.exe 87 PID 1512 wrote to memory of 932 1512 chrome.exe 88 PID 1512 wrote to memory of 932 1512 chrome.exe 88 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89 PID 1512 wrote to memory of 780 1512 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://sadasdasdfa1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d5ad9758,0x7ff8d5ad9768,0x7ff8d5ad97782⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1792,i,3131264497943851714,8123765449373305989,131072 /prefetch:22⤵PID:3612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1792,i,3131264497943851714,8123765449373305989,131072 /prefetch:82⤵PID:932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1792,i,3131264497943851714,8123765449373305989,131072 /prefetch:82⤵PID:780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2880 --field-trial-handle=1792,i,3131264497943851714,8123765449373305989,131072 /prefetch:12⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2860 --field-trial-handle=1792,i,3131264497943851714,8123765449373305989,131072 /prefetch:12⤵PID:1200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4612 --field-trial-handle=1792,i,3131264497943851714,8123765449373305989,131072 /prefetch:12⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3312 --field-trial-handle=1792,i,3131264497943851714,8123765449373305989,131072 /prefetch:12⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4716 --field-trial-handle=1792,i,3131264497943851714,8123765449373305989,131072 /prefetch:82⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1792,i,3131264497943851714,8123765449373305989,131072 /prefetch:82⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4616 --field-trial-handle=1792,i,3131264497943851714,8123765449373305989,131072 /prefetch:12⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=1244 --field-trial-handle=1792,i,3131264497943851714,8123765449373305989,131072 /prefetch:12⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=212 --field-trial-handle=1792,i,3131264497943851714,8123765449373305989,131072 /prefetch:12⤵PID:696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 --field-trial-handle=1792,i,3131264497943851714,8123765449373305989,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3948 --field-trial-handle=1792,i,3131264497943851714,8123765449373305989,131072 /prefetch:12⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=1140 --field-trial-handle=1792,i,3131264497943851714,8123765449373305989,131072 /prefetch:12⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50f6d14eef1d1d3f82553cab0dc11d6b4
SHA13df633b00a8f922d59c290a84607fae3c257cfd3
SHA25686038dea43c2e0702dc21ca6691a9f4045b2e040de9399a8850c5618601fb809
SHA512bde4d8bb02e1f529f801e2116430435196fa52624bbd56ec1ead6b7c21698399b8ede14fd49c6eeabe1365749a83ecf1d41028284ac6c508e979c11a1e821aed
-
Filesize
1KB
MD57d3bd30bb11c55cbfe61072bb52512e7
SHA15e418f3a5a59c69fbe06813a3dacb60c85df8e53
SHA256226b29b7014114b6238cbd19a8f361607694d984de8c58dca1b0189d18495809
SHA51247bc932cd6ef6b013dc1abfbd95648a52267dcee1cecce1ff815b6cea3fbe699db82b027184dbf6a05e13ab53ba638507ac4335f6d07b216ad71c622b533040b
-
Filesize
1KB
MD54e8dc5d70bd8014bb95bde6ec8136f20
SHA1347243a74cc5b0cd437b8ed1474ee654b426d7b4
SHA25697e1feb4c1244641858a00189787d0e93e1556e12ecf5c911b5359191d683286
SHA512bf54dd8acaf971e6fddaa6e135223a86df29d328a4d6d3faea3c451f59a7aeaa11a02bca7b394d536b3f41b628ab6b3d1c730742b83f8ad522c68411ff774101
-
Filesize
6KB
MD5b8ff91e9af7102b1af7c0a08c5fd2231
SHA186f0766bcfe1012a68621e4fe470241b081c9028
SHA2568d2e822ee64182e3c605afab7eab618c4693ee126101fb34d25e6c581d5a2058
SHA5126dbcb5f9bc3c18d20a5e6de8a904ad395d1538c1a14a86d5afe98d8e656c7fa8f060fba2ca641f9c6bcbeb0162d1e5e58d5c6814b8134e6cbfa81b6ec6b84fd8
-
Filesize
6KB
MD52c6bd6c4fb546397584f9ae498c24bf6
SHA1d7b0ce722ad8b83ca763a76ef2bb933adfb04297
SHA2569f059d75f3e3c42d80b14780206638c1947ef74d528bce150033477c9e374083
SHA51218ab91c84643490e736b1ab85fb93c920bc40f448c5ffb35bb2dd413d2f3a5c3106321ed5598d31713ce6c3db26b0cc4d15b3c669d2ed341c016851551b662e5
-
Filesize
87KB
MD5f25a0c0c54f378eef10656016bb271dd
SHA1940d52a414f825d09b7dbf12ccb1e69114605742
SHA256b320af5fafa302ae328f46bdfc1fc7ad2d692a3b84e56bdaf83b105179c46416
SHA512857b777d551a673444acd478ac694cb89c45f4051b5c8dd46d7cf0bbb7e78f858fb4c78e917651c48bb20511425181a14a0b275cdbb9d6023bff81d03d03230d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd