Analysis
-
max time kernel
72s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2023, 18:24
Static task
static1
Behavioral task
behavioral1
Sample
index.html
Resource
win10v2004-20231023-en
General
-
Target
index.html
-
Size
1KB
-
MD5
b1d01685d3f6da1c6767fa533c35f831
-
SHA1
940ef399e8492e00d6e357ec623cc92d0f74237d
-
SHA256
f307a2cd5ce65a25deb0fc26e93c3a6cc4fce12a19c2261b349bfe39a9561c79
-
SHA512
6a0ec50608096628f3ab1af3e2e50a1c1b380478346b8b132b39bee73d57be2cbfd216fa1d974efdfe509d848f3e7cc1cec9c405214ae6dfa4e54dc9ad73dfc2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133448919292269906" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3248 chrome.exe 3248 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe Token: SeShutdownPrivilege 3248 chrome.exe Token: SeCreatePagefilePrivilege 3248 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe 3248 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3248 wrote to memory of 488 3248 chrome.exe 24 PID 3248 wrote to memory of 488 3248 chrome.exe 24 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 3604 3248 chrome.exe 91 PID 3248 wrote to memory of 316 3248 chrome.exe 95 PID 3248 wrote to memory of 316 3248 chrome.exe 95 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92 PID 3248 wrote to memory of 1252 3248 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\index.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8fca99758,0x7ff8fca99768,0x7ff8fca997782⤵PID:488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1864,i,5064106876792278315,7055369851208226176,131072 /prefetch:22⤵PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1864,i,5064106876792278315,7055369851208226176,131072 /prefetch:82⤵PID:1252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2896 --field-trial-handle=1864,i,5064106876792278315,7055369851208226176,131072 /prefetch:12⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1864,i,5064106876792278315,7055369851208226176,131072 /prefetch:12⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1864,i,5064106876792278315,7055369851208226176,131072 /prefetch:82⤵PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1864,i,5064106876792278315,7055369851208226176,131072 /prefetch:82⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 --field-trial-handle=1864,i,5064106876792278315,7055369851208226176,131072 /prefetch:82⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4928 --field-trial-handle=1864,i,5064106876792278315,7055369851208226176,131072 /prefetch:12⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5596 --field-trial-handle=1864,i,5064106876792278315,7055369851208226176,131072 /prefetch:12⤵PID:3204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3468 --field-trial-handle=1864,i,5064106876792278315,7055369851208226176,131072 /prefetch:12⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5776 --field-trial-handle=1864,i,5064106876792278315,7055369851208226176,131072 /prefetch:82⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5916 --field-trial-handle=1864,i,5064106876792278315,7055369851208226176,131072 /prefetch:82⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5c4df5063e96c5f7ebdeb268ac7df8dd6
SHA1e85d11cc67f91922478179204a18f5ff980bd428
SHA2562e0f1766dcecdf788163b578877e1a672fcd350c83c3af27a4c9d2a720998cf2
SHA512e01cb6ddc5ff6ef5ba6e0019bc43a0c824ff97ed3859359ca4fe425f49d361ded65c70e15938ce95341cb846294405aa8b7df4ef4c0b74592d056fbc37a5756a
-
Filesize
2KB
MD5c7f08323d668e49596220edbeae063a4
SHA18878e628d9794f3b21c1b0abbdb527ae4d4958ae
SHA256f6dde17095a40f335339324ea486722bd9d24ad56b4c5bd5431cd5ede292212c
SHA51261bd3f68325ef79e2b8b0e0ac0f87e6bbfb5ef449217e4e8f3f701c72b203779a6cf8d3bfbfb41a0ce196cc38e305053e1dc2b92b884f48843308d32b5d60d3c
-
Filesize
706B
MD5032e01cf2dc7202bc5c6676cc7e34a11
SHA10628dea8a889920681e468339002b373ec7bcf82
SHA256f257d7d7521eb6817a52b44f6f5e9b5e005c45d43d4b1d79b8938245c9e3cfa8
SHA5129a247de634124abd95187fe803ac75512f6be4dc773a0ce1f0ad32dd8dc921559abec06c097eeca8d221590ae262ecdaeffdb1868e6eb0d8e81f7b5938ff7f2f
-
Filesize
706B
MD52a605a971f131441ec3d2ef84f729c23
SHA1bf42ca105f6aa2beb9339d60fc17ab22f7547f2e
SHA25669499a98bb1ef758f0706038dad380ae4da28647dd26d695575872f78cd9b2c9
SHA51243ad816de1e2b9d0d8f9c19cff40671aabed1144b168cbaba0dfdda38ed9e44e196f3bc5a41529ce136528f53286a136c0c8b0287d1eacdf42a5ba719b78e099
-
Filesize
6KB
MD582b857e373d3f5f0709f066be1016322
SHA15f5532babbb902f3babf6225c92baed5c35e390d
SHA256abb572ba35d6b01412b6708f9756ce2e7f250e52ab844eb13f13c1b70df93b89
SHA5124f9da455b9fb75d75b702d9c5d7fd0a9b099045318e1ee2d43e46889e17329889dea3ea9e0fd63ede7a264df88949e0cf72c0c7d357f11ad90eb0591fdb84520
-
Filesize
6KB
MD57706b536cd3877819ad9ed979955377d
SHA1cba51670f16159527218c82f39caa1dd10a30aca
SHA256781a7b4b0aad43557a04a071b30a16c5f543b53f406a7e1b934fa699a05652f4
SHA5128ff6bc1875ef3a40d0d9669eae0b43edab26a13b9125d84ce282ca505cff6db69b112ad435a899e22f6f03b495e32d7d9d88698acd8f6edcd76c3dd6b7957974
-
Filesize
6KB
MD5e8f31ab2e362faf449db00a30743a1ed
SHA10bc5a8f4e787031e3faee1ce705101917ff73541
SHA25626483f010f7df4818afa4c6db025a3463088536d936c7c923e1c915dcbafea56
SHA512adfba2d11779a0aae91b9803fdf340b7300ea11d54eb675e2c37a2300eaf7ae0b85935f31734dba747a63fa3b7632397eb13a5dd5c94a12c89aa15d3363b81a7
-
Filesize
214KB
MD543e236d1f642fe6dadf1d9ca0812056e
SHA14ba016b6b1af64f1a6c1f712abf3424010c286e5
SHA2561f123318fbb858fcca1f9132822547892012fd9c81deab31d382d70c766715a8
SHA51281b146470a87094b49f13597b8d129e5eefe23501097f520c895573da35394d5e67dcaf1b8bdad45ec7a34e4e243ded9f3ad216577104e6662713fc072ef3f1f
-
Filesize
214KB
MD5f7892a2b5e076aba745dfdab1bf707ab
SHA14f23fc01bb6dcb6c7a7b3fb8c82042252641e1bd
SHA25625e010d909f03f6e47cf18408e3c2bdd81122451c8879d7fbbc806f90073c6f5
SHA51279399adc65ac88d6f54fdd58e72e2902175a5267a4d83467692979c98b97df3633ddf16fa58c9bac8beeb830ce3f2a2a85f8b86d980cde392a33b994287b8321
-
Filesize
214KB
MD5ecf2f26d2394ca28167429e12ff9de5d
SHA1f32bf13731b423c383c33eb7c82cbe765ea15cca
SHA256c00a52e6d3114ccf9403de848ed54f9d9f922faa1d203a650bf7c4466cb3b8fa
SHA512b4ca68bda7815ba30cac1a60d026062967d084ae782a12b0247cc02ffdb02d4134f5c0fb9b63515b509280ed3a17b8dfd600e60ae8547091177b1231467caeb3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd