Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2023, 23:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://foottherapy.net/brookstone-aqua-jet-foot-spa-foot-bath-reveiw
Resource
win10v2004-20231023-en
General
-
Target
http://foottherapy.net/brookstone-aqua-jet-foot-spa-foot-bath-reveiw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133443069018917114" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2784 chrome.exe 2784 chrome.exe 4736 chrome.exe 4736 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe Token: SeShutdownPrivilege 2784 chrome.exe Token: SeCreatePagefilePrivilege 2784 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe 2784 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2784 wrote to memory of 4284 2784 chrome.exe 86 PID 2784 wrote to memory of 4284 2784 chrome.exe 86 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 3696 2784 chrome.exe 89 PID 2784 wrote to memory of 1452 2784 chrome.exe 90 PID 2784 wrote to memory of 1452 2784 chrome.exe 90 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91 PID 2784 wrote to memory of 3964 2784 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://foottherapy.net/brookstone-aqua-jet-foot-spa-foot-bath-reveiw1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x40,0x7ff904959758,0x7ff904959768,0x7ff9049597782⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1884,i,3000338614413299338,16604972069290147239,131072 /prefetch:22⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1884,i,3000338614413299338,16604972069290147239,131072 /prefetch:82⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1884,i,3000338614413299338,16604972069290147239,131072 /prefetch:82⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1884,i,3000338614413299338,16604972069290147239,131072 /prefetch:12⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1884,i,3000338614413299338,16604972069290147239,131072 /prefetch:12⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4560 --field-trial-handle=1884,i,3000338614413299338,16604972069290147239,131072 /prefetch:12⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 --field-trial-handle=1884,i,3000338614413299338,16604972069290147239,131072 /prefetch:82⤵PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4480 --field-trial-handle=1884,i,3000338614413299338,16604972069290147239,131072 /prefetch:82⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4484 --field-trial-handle=1884,i,3000338614413299338,16604972069290147239,131072 /prefetch:12⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5164 --field-trial-handle=1884,i,3000338614413299338,16604972069290147239,131072 /prefetch:12⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4504 --field-trial-handle=1884,i,3000338614413299338,16604972069290147239,131072 /prefetch:82⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3296 --field-trial-handle=1884,i,3000338614413299338,16604972069290147239,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4736
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
840B
MD59c56dbfa82872f73ec41044fd8da12cb
SHA16e80c60fcc6d8fe75cbd2b7a81699e8105270a43
SHA256f23bcce15f323d8af9d17b470e208cf8d5188d238e90f016c7178641f7d724bc
SHA5122075108ffe43d6fcb27173f53d605e3d808e0696ae0d6302829f768e22817a43358d9306ba80c30d8c479accd9d12ebc0eee3d036807f667b0c7bb45f53d0497
-
Filesize
6KB
MD5c9095564afa0bd5fc56d620537f075be
SHA1cf6ce6e2627dc52c0664aa837049865e0150f3bd
SHA256290d28210e558b0a152c0c8c460f10848bf85a80806d60785944d26e019c1c2c
SHA512995c68c69794956cd359bcd6ddabbfc3a5a58c57b64a97e353fde0714488d91c928f9d0a22b3f784a399026b7d135065b70990fa371ed61c7d83aa897bd863f3
-
Filesize
2KB
MD583277421ad39707cdf9ad6affb2fb095
SHA18c18e9cd077ba4a5078ef48cf2434e5681620170
SHA25674a6c998b0894f1e547b736a57b12d2cdf40ef0a3b6207297d9f7ef4c51b1eef
SHA5127a4d4a26389b9fa061141a83203699320e90c7f042e2b10a061e45447bbdbd9551f422d0151b079426ed33fdcb736b260b399fc57e7997cf950743ec523745fb
-
Filesize
6KB
MD5fa8c636d314951b4e7dca39aeac2c886
SHA12e5b801b1a0677bd58706ad2ac841b9e64308b2e
SHA256a1c63dae4e0105f26fcd372b17accb1b83e9916e78d9e6729bed53da523cf3d8
SHA512110f587d7f7202ab384f186785e1010bf9d0239e2789cc20178a28ad4153b5a22c2da6586925f580a8690e4eb418eabfb1f5b21338b3fd994c0463b80b0d066b
-
Filesize
6KB
MD56deb795dcbcb94268d6d154de8bdd287
SHA1920d4c996134d824891fb99ff18f2e9cc91c1fb6
SHA256a8ab04dc15332581ede1f086411f07f1474b993229a9e5011c9be3954efaf9af
SHA5128e0fa0741457223c5a066e1da9b25d9e0eae3ad733047cd62d2555a2af04fac0f4b07500d3f4fafbb582acd73e9fd60acd937cc0922ce00e029da9af72292a2f
-
Filesize
109KB
MD5801b7bd414f7d7b383672cc53e0b42ed
SHA1642a6ffe20919a7b26ca3847353d1537d9a088c2
SHA256e4fa2169c335737ae77006b723a4a55ed312feaec8a24f8aeb23373f5029ddbb
SHA5124f3df403967dbaa47686e52ac7ed30054aa1f5dfb038c7a76c52c3b3a88e7455fc8bfc5cf93e339625661ae52661911773c8ca54ad670f4e33079200aedb9e94
-
Filesize
109KB
MD5feda93870e72a3d1aba2a8b7613a84fe
SHA13d5b8a8ad8fe217fad21f5b73f097a5a102e36eb
SHA256b3f4407cb1b4405dd8ed8f8fc19d2f1798fd16bc265088419b2461a34737c886
SHA5129df1e8b546edd41d659c7d7b2656adb436958f5de72004fe9d7a3b3d1eb62dd28a708b94bbaca6f8786e123c37a9a2c1be507316552f9445c7f1964de39bb54b
-
Filesize
101KB
MD5469d9a410b369d5b6ab09c6faa22e9d6
SHA1566e4dd10f5540b5afeab73b379600f113eaad7d
SHA256fbf04044461416d57e6da24e0a11b3bcf9204e03fa9782d3f42ed1a8a5bb0d0a
SHA512747a3e82a4d966546ae54e52db7a1424df33856105520ee79c591c6113f6b95418932029f87d72fa45c0cf3351a6bc564643fedad7e62963b9c4855c859f4b2a
-
Filesize
97KB
MD5ebdd9e95c6076507eacd5d888af45b96
SHA19fe570fb3b061ca5e5e469df5701fed63450a298
SHA256a94fcce7ab9ec3c2c541d6951d0a0f0cdc2e82073e8e141dff8538d8638df24f
SHA51283c7ce604ac137f6d858de7bcc32f453212e42520b06bdbea461ed8eda89e5efd00e954d074d560af068fd066f064a38e0e6db1c373d79a7bf1e5bc28ee18876
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd