Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2023 12:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://api.smtprelay.co/page?lid=eUWuYRmK6nd3b2MtaZsv5w2
Resource
win10v2004-20230915-en
General
-
Target
https://api.smtprelay.co/page?lid=eUWuYRmK6nd3b2MtaZsv5w2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133413279508371521" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe 4824 chrome.exe 4824 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe Token: SeShutdownPrivilege 3380 chrome.exe Token: SeCreatePagefilePrivilege 3380 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe 3380 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3380 wrote to memory of 4188 3380 chrome.exe 30 PID 3380 wrote to memory of 4188 3380 chrome.exe 30 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 4780 3380 chrome.exe 87 PID 3380 wrote to memory of 3832 3380 chrome.exe 88 PID 3380 wrote to memory of 3832 3380 chrome.exe 88 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89 PID 3380 wrote to memory of 432 3380 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://api.smtprelay.co/page?lid=eUWuYRmK6nd3b2MtaZsv5w21⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff91d7c9758,0x7ff91d7c9768,0x7ff91d7c97782⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1856,i,6275054161819726234,6219391371573370439,131072 /prefetch:22⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1856,i,6275054161819726234,6219391371573370439,131072 /prefetch:82⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1856,i,6275054161819726234,6219391371573370439,131072 /prefetch:82⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1856,i,6275054161819726234,6219391371573370439,131072 /prefetch:12⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1856,i,6275054161819726234,6219391371573370439,131072 /prefetch:12⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1856,i,6275054161819726234,6219391371573370439,131072 /prefetch:82⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 --field-trial-handle=1856,i,6275054161819726234,6219391371573370439,131072 /prefetch:82⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5096 --field-trial-handle=1856,i,6275054161819726234,6219391371573370439,131072 /prefetch:12⤵PID:4172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5256 --field-trial-handle=1856,i,6275054161819726234,6219391371573370439,131072 /prefetch:12⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5368 --field-trial-handle=1856,i,6275054161819726234,6219391371573370439,131072 /prefetch:12⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1856,i,6275054161819726234,6219391371573370439,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4824
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD53698e481affb861e0fc6de390e6a7bc7
SHA14201d61d97ffe817ac384ecf026a6b93eb39d689
SHA2561c291a038fbc6761355383edf1d537a447e56963418af7504e9e4b09864c13ce
SHA512eb6c04b44b204a066d648da6a2ad1695969915afdf128feca4ad038dc6341cb0046f203957858cbd73cd836d22ac5d80d18abbdc9ebb36ea415f0b8b542571e5
-
Filesize
2KB
MD58484976b72d3d3c1929f05e53700126e
SHA1b2b6089e19d51da57187737bcad8219dd325d677
SHA25605dcb9510231fe27dc85eff98e2e5e1c8c77f49a7709565c4f49f2490d8590d7
SHA512cc446e33521a902d97e209cae913be2f5640c55cd1a94d2f43e78f6bd6953e3183d6b5cb14957f95aeabd79855f16d33d31a4f2de5c4858f9041213047691b28
-
Filesize
539B
MD5c4c9c22748ebc7196264c4be035bd897
SHA113cff29677ab06f98c639e8cbf0103009c47fc8d
SHA256b01a2891f1fd63918561c2e930153127f6d681b6d0d2d287ad6de9e460626c19
SHA51220f9850f3ada1afd62631de99450fac4861b41d23c3b00e0a355ca6be33b4e4e7ea981bd57dc2c64db5470d38655338b1c71156759432347fd4e008f63acfd52
-
Filesize
706B
MD5d3375141f2c3e008794c905cc3d16cf5
SHA17f281830c19308c5043d55194f862524cd36584e
SHA256709dce744602878ec7e76a323de2955e9070e7297741b1b3fb18b21529f491a4
SHA512c3030bd8035e64e0abe82ff16cfc3f12ef47ab0462c0de5ffa013370fdbdd8bb94e154580710724486b9d7971654b8fa32e979b52e0fa62b03416bbc0d5b86c7
-
Filesize
7KB
MD5406612dc6d3242dc33f1bcad8a758ee0
SHA19441ac0446a2943e67669900a4c398aff44300d8
SHA256b532fefcdf59ed6d772b5c29b23fc82be7e09f350c9e58fa61c4404be8c7c9bb
SHA512b596d733ae8d235839c5625230d24dc3a23f55e7aa8d98f832908c46a5996765c377bdc9ff9e30a029288c38c9032266f5c37c214a45b98e964c1c91f1f4f62c
-
Filesize
6KB
MD50e391d934eabc67d2504e1f479fb858b
SHA14459d370e226446076fffdf404adada8be55f64e
SHA25657b76d433f84582312ea558afeb7f5e0c7545f2d0c1138fbf0dd023c0ca4719d
SHA51230d7f36a289d6a2dc355fc3aa6ab687c016eee14672adc09d3f20ec415cf89c5318c1989a7d90a6b0ba9445a8af386b74f28d1e1f3baafb8e5e9ac15ef205ade
-
Filesize
6KB
MD5aa4d7eb3222c7a90054d8aab09f9e3d4
SHA15918301fcecbde3d1ecfd03ed8daf5383659c7a3
SHA2568d34f8578565cae420470116b89a6e85ad3b0f0fb35d634c276ad5bb40eca499
SHA5122602c1170efdb8035baff6f047fc3a831f1ee8a2293ad54f6fd5659067166ea17932c2c2849817f4d07e63e5a5db57c14037b3d54b452ecda8aa435c127f5093
-
Filesize
101KB
MD5b1ba35d249488e3999f568a05ddfa2bb
SHA11ff7fc90b3e9e283ad3db073d79a7dd5222eac54
SHA256e9bfe73f7235dbc965951b281de1b27cf7d0a76365bee08efc674147f26a4e63
SHA512ccb4bf13d9bfa4e8fb7bd2fd2b8a9428c3a724a17b6bb16f29161d4bb1e505b7d31845254521f762fea9ba90b81e638c248ea3765513d01a0c56d81c8c78f42b
-
Filesize
104KB
MD564fac5c6716b76ffb5565bcb5a8df5ca
SHA10eb3f6748c301c7fee81e1ba4c6414b9084ed81a
SHA256f5651416e6c765cb0950ec7f07f652126f035792b99f5d59a3da0747c2c7cd24
SHA512f97c1c50c64bb8ceac4bf25b2c4a87c935b2594b63a2fc685f57fc31dd65bd8b21682bda0c535ea0a87e2588ca8a6001d4f0742a44056583cac1ab73300f899f
-
Filesize
101KB
MD5bff602c4d7c99b42b59875c1f0244b20
SHA1d634bb0109d8a86d7dce4ec74681dab3dc174f99
SHA25639027ced157304b6c8d21eb165faeaa1e2e78ea55a2f90f10b2913eac1dffa3a
SHA512bcd6dd2974a942f0cfb65322e72bb2ec541e3d9b7198e9ec6c95cb624e0da622f2888c5e2e95a3a167041210a4a29394637ad532d8610a3521562bf8c747a7dd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd