Analysis
-
max time kernel
84s -
max time network
80s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2023, 13:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://kiabikids.co
Resource
win10v2004-20230915-en
Behavioral task
behavioral2
Sample
http://kiabikids.co
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral3
Sample
http://kiabikids.co
Resource
macos-20230831-en
General
-
Target
http://kiabikids.co
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133396051402319788" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 216 wrote to memory of 4892 216 chrome.exe 82 PID 216 wrote to memory of 4892 216 chrome.exe 82 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 1572 216 chrome.exe 85 PID 216 wrote to memory of 4500 216 chrome.exe 89 PID 216 wrote to memory of 4500 216 chrome.exe 89 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86 PID 216 wrote to memory of 4100 216 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://kiabikids.co1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffbba2f9758,0x7ffbba2f9768,0x7ffbba2f97782⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1896,i,11882052243163767757,14299458857482435805,131072 /prefetch:22⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1896,i,11882052243163767757,14299458857482435805,131072 /prefetch:82⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1896,i,11882052243163767757,14299458857482435805,131072 /prefetch:12⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1896,i,11882052243163767757,14299458857482435805,131072 /prefetch:12⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1896,i,11882052243163767757,14299458857482435805,131072 /prefetch:82⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3900 --field-trial-handle=1896,i,11882052243163767757,14299458857482435805,131072 /prefetch:12⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1896,i,11882052243163767757,14299458857482435805,131072 /prefetch:82⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1896,i,11882052243163767757,14299458857482435805,131072 /prefetch:82⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3812 --field-trial-handle=1896,i,11882052243163767757,14299458857482435805,131072 /prefetch:82⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 --field-trial-handle=1896,i,11882052243163767757,14299458857482435805,131072 /prefetch:82⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4876 --field-trial-handle=1896,i,11882052243163767757,14299458857482435805,131072 /prefetch:12⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5112 --field-trial-handle=1896,i,11882052243163767757,14299458857482435805,131072 /prefetch:12⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5056 --field-trial-handle=1896,i,11882052243163767757,14299458857482435805,131072 /prefetch:82⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5244 --field-trial-handle=1896,i,11882052243163767757,14299458857482435805,131072 /prefetch:82⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5642d8cd2e14bb37d42c601c7d07f3e32
SHA19b1588c6f5fd00c9fc3faa42e182dd7fe65137c5
SHA2560f4f7528dae67fe02988bd6ac1cceb6372e91d9770650a7f6331190faa5ca91b
SHA512aa620087ad0b1b8f24f3e561ffc788201bde82459928ec27d3ed3efc40ea036987e263bf4885de87e90d1aab8ce5c249f6186fb7fac1804245a255f16b6c63f7
-
Filesize
1KB
MD5968f4f795604d7d7270744e5aad6036c
SHA13cd9504ab3f491ae2527c3148dc83af0017fdbba
SHA256a86f77606ddc9b2c18f8ba47475a7601ea01f8286730770de56af69a342cca7f
SHA512a4ddb11f7ee898bc4398c110bc16690570f59076eb69b5292a6409b45097b38ca70e6653ee185d6dcbdc4f126f1737b3524d47a95cefadaacf2e4b8036146bc1
-
Filesize
371B
MD500f95e76dc322c2e408cabef2a49105e
SHA11bc39050a1c84eb824bec6b73bcb4d9e509b14f3
SHA25606a23ceba59886bee2acc86c62dff2b9381cfbddaa3b81dc1560b71351b988be
SHA512178bc7c2ac1007d0a605830f75059f69d1eb03b74859eb916b8a7e60a390d5ec93e5bd46fe99677753183449113f50b9c408aa9e360c11b341498133901120ce
-
Filesize
6KB
MD581708f2a025aaac27b65240162890bf6
SHA1be0cbb3d08a8ca99c0440061e5dfbef28fa400ed
SHA2560ba59658d8586e3684f46393a1a697f7c2302338b7f90bb55580e773b302abb4
SHA512ac15bd33b23b6ca24dca4ebce40e7110fb39d398d71799b8cce3ee85b240f4a68cbb91bab12d7c527f0832f6390313283c19b5e7c56daea2a9cab337a31440d5
-
Filesize
5KB
MD5941d6cc16658617ce35558f9e1b747af
SHA1789ee0e0a285aea6350216ce654b629ec121829c
SHA2567dd64c5f8aaab944abd9d1091170ca36dfbc66876c133852cb0fd94b5d0766a3
SHA512b3b482254527be8a748f13402dbeaa42aada68f3f75231283594f80d8bacfbc60a80ca04ad72274c40a3a1e1fcc0865e8d6ef4bc671ca53c0fbeaf730ce2520f
-
Filesize
5KB
MD567f4bcd55a0a56db089b264072625369
SHA1d3c24c2e83e105dad80cbd9873bf796ae72b28dd
SHA256b37eb6f7b48006895c9d47960632ff0cc83312a1e902e70c139ca4ee94e6ea77
SHA512b1457330abdc3b6c12ece71291723cf06c48ff9a3b3b42a20d4c91b866808f615bfb40fa0fc2d5e1a16dce041423e1cae914b23ee3bc6d8da3d6a1f533b93c81
-
Filesize
104KB
MD5cb2e063f1bfbfd03c00cbfe3c63b0c70
SHA1a22677befac9d2a9cbc8a4c17f150f7465d33aa1
SHA256e18cb2d51b18b54ec9ccd5101e49e5124019820b7963d4db45ae9d90e7c29a4c
SHA5126eca858491e2568ac77c5c938a5d659fad9e1de99b4022047eefc29489514e6eadb483afe2937fc9b516faad89323a6337d3f0a670886174bea645d097e851d6
-
Filesize
137KB
MD5f50a3d3e4cf0520522d4dd8ee35aab06
SHA15f6b65c4beebf5204f58d718df5be135efe6f8e1
SHA256f49fae803ef56e8682f229644b45c02d8a8dc863a46b4726fa17556b3b74c37a
SHA512d8c80840fc112d6f8a0d7d17c7da539213866e1858c36175e047149ab7389d5e4b9a5ea4e5969acb721f56efd9a72ff6af7ac5aa5ab8dc2fa3b916c3d0bf7ef7
-
Filesize
103KB
MD5930c21d5d3a2fabba35ffd10415db8a1
SHA1bc9b6ba42b4e6869c56ad36eda1fc1066e7d3228
SHA256e0c45bcc9666ab1de3052a5351f5b102705d14d340d1b0a3a651e99f6003a475
SHA5125f89d55fb934bcb9140fb395f0e714841c2dd9750c12cc3150c32d7fe15b9b4227e362e43de25a89caf9a04e2966c824ae8d78d047ee37ec10e90cd7400935d6
-
Filesize
104KB
MD54bcc6a2bfad31683450beda2b0e70a51
SHA168074c34ec89dcff8b7b90dbe7933972686880f3
SHA2568fa854a8ed5e4e439668af3e27019f2fbb3b394a559de6ecf1843f831226325f
SHA5124c6408e7d9792f33278c5027c241f53f23cc31fd2eebf3354b939747a827e240cbd0458892af6f5392184bcda6d0171571076a0df12c6bdb41c6e7f8bf305323
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd