Analysis
-
max time kernel
300s -
max time network
280s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 16:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://clicked.missbiscuit.com.au/ls/click?upn=nWCvzFVqHZVM9NpZxqA-2FmpU04d5Ahfv-2B13SCZNlMhyyDK3poMqTj5a8x-2FScq-2BeCCNFihW5xtghVjDR6UpHjgel04ASiGH1fUed8-2F8AHj-2Foo-3DGqBk_7FOvm9j9AmMIrYH4R7gau6KvEruWWlAjRdU2kTkI3lfgYOyEdzmgYj8z1okjELeBoRut6M5sam-2Bg1TRUt2mGA-2FP-2FqIiPYEL9rRH832o4QgYZzbv9sTJEM7Tl22vlIvmOpWYK5Rqp8TF-2BtuElIPoEVfIO9-2B3VLdXNFykaY9GXz44doD1-2FtiuBdArZFVBwXkbGd1CHKIPrxlPoZl3UigNnAw-3D-3D
Resource
win10v2004-20231020-en
General
-
Target
http://clicked.missbiscuit.com.au/ls/click?upn=nWCvzFVqHZVM9NpZxqA-2FmpU04d5Ahfv-2B13SCZNlMhyyDK3poMqTj5a8x-2FScq-2BeCCNFihW5xtghVjDR6UpHjgel04ASiGH1fUed8-2F8AHj-2Foo-3DGqBk_7FOvm9j9AmMIrYH4R7gau6KvEruWWlAjRdU2kTkI3lfgYOyEdzmgYj8z1okjELeBoRut6M5sam-2Bg1TRUt2mGA-2FP-2FqIiPYEL9rRH832o4QgYZzbv9sTJEM7Tl22vlIvmOpWYK5Rqp8TF-2BtuElIPoEVfIO9-2B3VLdXNFykaY9GXz44doD1-2FtiuBdArZFVBwXkbGd1CHKIPrxlPoZl3UigNnAw-3D-3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133444522340805309" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe 4524 chrome.exe 4524 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeCreatePagefilePrivilege 2884 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2884 wrote to memory of 1244 2884 chrome.exe 60 PID 2884 wrote to memory of 1244 2884 chrome.exe 60 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 348 2884 chrome.exe 89 PID 2884 wrote to memory of 5044 2884 chrome.exe 90 PID 2884 wrote to memory of 5044 2884 chrome.exe 90 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91 PID 2884 wrote to memory of 4248 2884 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://clicked.missbiscuit.com.au/ls/click?upn=nWCvzFVqHZVM9NpZxqA-2FmpU04d5Ahfv-2B13SCZNlMhyyDK3poMqTj5a8x-2FScq-2BeCCNFihW5xtghVjDR6UpHjgel04ASiGH1fUed8-2F8AHj-2Foo-3DGqBk_7FOvm9j9AmMIrYH4R7gau6KvEruWWlAjRdU2kTkI3lfgYOyEdzmgYj8z1okjELeBoRut6M5sam-2Bg1TRUt2mGA-2FP-2FqIiPYEL9rRH832o4QgYZzbv9sTJEM7Tl22vlIvmOpWYK5Rqp8TF-2BtuElIPoEVfIO9-2B3VLdXNFykaY9GXz44doD1-2FtiuBdArZFVBwXkbGd1CHKIPrxlPoZl3UigNnAw-3D-3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffc69b9758,0x7fffc69b9768,0x7fffc69b97782⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1644,i,6990041865671496672,2364091537865061442,131072 /prefetch:22⤵PID:348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1644,i,6990041865671496672,2364091537865061442,131072 /prefetch:82⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1644,i,6990041865671496672,2364091537865061442,131072 /prefetch:82⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1644,i,6990041865671496672,2364091537865061442,131072 /prefetch:12⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1644,i,6990041865671496672,2364091537865061442,131072 /prefetch:12⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3856 --field-trial-handle=1644,i,6990041865671496672,2364091537865061442,131072 /prefetch:12⤵PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4812 --field-trial-handle=1644,i,6990041865671496672,2364091537865061442,131072 /prefetch:12⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5032 --field-trial-handle=1644,i,6990041865671496672,2364091537865061442,131072 /prefetch:12⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 --field-trial-handle=1644,i,6990041865671496672,2364091537865061442,131072 /prefetch:82⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 --field-trial-handle=1644,i,6990041865671496672,2364091537865061442,131072 /prefetch:82⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4912 --field-trial-handle=1644,i,6990041865671496672,2364091537865061442,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5e13faf541ed0909f26e06e7201d7a0af
SHA1d203a1018d3df40d1fe0f356cc2376813880c435
SHA256c2cc9a45578cec7e545bb0bcc0b7f0afd387851374dfbc2238e2c67eae2387a8
SHA5125a31f866c9c6b3b50094f142d33f1a2aac1673217145086ffe5fa01afcbaf7cb56dd7ee23b64e327fa9e5d17ce22d844c8c9f43911b5920e8880036403a81040
-
Filesize
2KB
MD58bb17fba43f62c83637605b625c8b69a
SHA19c330fdae3d967f6b79e4e3c47b39268113ddc7e
SHA256c0e9c1e17d5e622b9b094cf3856dd75d4a3e14f8f47a4d81c880ff80f908e3d7
SHA5129f84c9fdfbdfc26a4494cebf9e1ea3acb2fdb08ae0daf80c92087c2d2b9d5ae8bf6f0bdc692dee17201f78b5a0f5829fb26e637203daf398b3fbb7c987775422
-
Filesize
538B
MD560b1a057adf1cb434f9f4adf842e70b2
SHA17e81da869cb61419610c7ee13680bf1fe1a399a3
SHA2563dc65f8613db5869b92e0b93d508f445313b9f45458fa766b38379f7c066f238
SHA5129542354490ae380273864d2e7db18a9d16078dfd6e61f5163ec8e1c72a7d6d58c1dbd940d329ae2ef7df4fc40d2f2271d15cbe49ce554fc14dda58de114af47b
-
Filesize
6KB
MD5e53854828a4e7a62d3da1f26fe306747
SHA1b66dbf4d4c7a36f8667494b1d7080ffd27c1feeb
SHA25606e3bfecc5f69b170ed4711ffb4aae780f2a41aa6be1ce52caf29ac972d3bb7f
SHA5123cf9360475edb9ea70fbb1ea9d17cd508e7d4d4918a80971b41ee5d2e9b405ba91d47d9d4e4927cb3e838940fd413209cc6aa904eb0b4521e9689d996943a094
-
Filesize
109KB
MD5b8f2644731e453ded3cb3e38c36450fb
SHA1b8255a6d96d029b00ad0070080384badcd04013b
SHA25642e0fa31dc0c3b05db8ebe93683af545ac6cd4c04518d7865b7f257b1e2af1dc
SHA512a00298c6a9490567a1467d5185cf09c113bad71fdc07fac47623da30908b7f422a68da291c65c6bd52603d9c514ae651cc6e8ad16b8e69155f4dc0af79751e90
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd