Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
38s -
max time network
39s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
23/10/2023, 22:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.com/amp/s/corsehotel.com/anna8Daday45sa0Tjos1mCE5Qnsa8D9vKoy45
Resource
win10-20231020-en
General
-
Target
https://www.google.com/amp/s/corsehotel.com/anna8Daday45sa0Tjos1mCE5Qnsa8D9vKoy45
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133425727601413507" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4500 chrome.exe 4500 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe Token: SeShutdownPrivilege 4500 chrome.exe Token: SeCreatePagefilePrivilege 4500 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe 4500 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4500 wrote to memory of 2208 4500 chrome.exe 71 PID 4500 wrote to memory of 2208 4500 chrome.exe 71 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 3248 4500 chrome.exe 74 PID 4500 wrote to memory of 4080 4500 chrome.exe 73 PID 4500 wrote to memory of 4080 4500 chrome.exe 73 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75 PID 4500 wrote to memory of 4620 4500 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.google.com/amp/s/corsehotel.com/anna8Daday45sa0Tjos1mCE5Qnsa8D9vKoy451⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffdadb49758,0x7ffdadb49768,0x7ffdadb497782⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1804 --field-trial-handle=1816,i,6155269528344028621,10635636639913792593,131072 /prefetch:82⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1584 --field-trial-handle=1816,i,6155269528344028621,10635636639913792593,131072 /prefetch:22⤵PID:3248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1816,i,6155269528344028621,10635636639913792593,131072 /prefetch:82⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1816,i,6155269528344028621,10635636639913792593,131072 /prefetch:12⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2068 --field-trial-handle=1816,i,6155269528344028621,10635636639913792593,131072 /prefetch:12⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3584 --field-trial-handle=1816,i,6155269528344028621,10635636639913792593,131072 /prefetch:12⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3104 --field-trial-handle=1816,i,6155269528344028621,10635636639913792593,131072 /prefetch:12⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4468 --field-trial-handle=1816,i,6155269528344028621,10635636639913792593,131072 /prefetch:12⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4568 --field-trial-handle=1816,i,6155269528344028621,10635636639913792593,131072 /prefetch:12⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4408 --field-trial-handle=1816,i,6155269528344028621,10635636639913792593,131072 /prefetch:12⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2976 --field-trial-handle=1816,i,6155269528344028621,10635636639913792593,131072 /prefetch:12⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 --field-trial-handle=1816,i,6155269528344028621,10635636639913792593,131072 /prefetch:82⤵PID:888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 --field-trial-handle=1816,i,6155269528344028621,10635636639913792593,131072 /prefetch:82⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432B
MD5352f624359f30a1114f364c054a01356
SHA1a6eb45c841ce5985645e1145134e4fe33222a497
SHA2560d2e50dca7c4ee3aed8ad47d311f0d27b1749c638343383a433c7c4b1bc00daf
SHA512b165a7d253bd27a56444d917cd29c90265deee4968ba7a6931548fd54816f351efbcaf8d68cf827be73138c95b814e40cf743db21dfcc630defb4d3f9bb2fff3
-
Filesize
1KB
MD5cb1a4a7bf12d9c34f40a70b5486c1d47
SHA14ee990f7619552aae1917b1ab3af8683cbadab13
SHA256397dc156d758f1f7f534f65d70806eca237a2d37de723f775d0cfec030e3fc33
SHA51297bad89b996c6f61bf6d790bdc9f5ea65496495d59f1a1ef362c494ee6421ca81410bd5a223d38fbc0edaee68639ae23ab9c2081913faf4ba37067dd9dd9a44a
-
Filesize
1KB
MD5010aa75b39fe6319c441ef8d675ad01c
SHA10a51c8f4c8437fa72c8b987f699d760ed5eb8781
SHA2567bc5ee61fc3c2dfcb7175d3f3a3e8b4f73d3d346acfb11e48d5efdacff36e800
SHA5127f282ed4d820e6585110f9426c368ce6d0b91b123a0451079d37ebdac59056af40955efcf36d304cd9b67da05ef85d6cf8b3ab088512713f42045b3576bb90da
-
Filesize
6KB
MD548628b78b56c7990cdd0b60cbe2aee30
SHA1b28665999afab66f3d11abe576664967c07184cb
SHA256087dd643168e49dae132bfb5a208fc738100554284877592d53d0106e6911a9d
SHA512524d1eb60bd1ce0552baa9cab7e15f5d3f5dca0fea9d159969dffa802f56aed60a7beeb1e783da38525cb781b4c9a20b132d3a04f985cd8d69509b10a55df0c6
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize240B
MD516e37dc4c6055192b179130339b5d3a2
SHA1efc9ad516ab479c052d17d6daa4514af420e5742
SHA256e167f5de90f56435bc9e937da9ad8e1c1613e33bd936941cdd04887b25ec6710
SHA5126d5d6efbef81ed49ae6bd3a32dcd8fbd7ba738e56065c932901f5cd4681838a15a1f58141f8b40ff6d5027a0a9283cb3dfc91a9141b3ed034d7c98e2f0a0b38f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe581b24.TMP
Filesize48B
MD54056887942ab85d8a6715bdbf82a5298
SHA1b174433d930a99127523ca85fabeca13a4ea3328
SHA256bc38cfa48881f7aa522a49aeffd3f2394fe3dbe8ca2ef0175fec370aff9680af
SHA512238c2359a47cc0425a8f936293d78b87ffdcc9b2df2086d7622dbd1aed7f78d4d77bf1a93a56c1d16fd2c2e691c486ce66f500443f3e6d7785c315832a4290f1
-
Filesize
109KB
MD517f14b8412194ed8012b9524496fafb9
SHA13f3339b3f0509eadc604f63d8bc6f96795c684e6
SHA2560e8875148330b43a10b08b35188568a42fc20e1684c49a39f3cbe2f694739929
SHA512ce35dbbd31b1209df5d3b8aa6982cb5586422f7a3315c0a0b2de22d7f5e188076e33fd7250becffdbaa4f3b9b023cc9d8372412c5e21f68cc9fc48de2b34b184
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd