Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2024, 18:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://wyoming.dyp.cloud/login
Resource
win10v2004-20231215-en
General
-
Target
https://wyoming.dyp.cloud/login
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133486934288698067" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1296 chrome.exe 1296 chrome.exe 3592 chrome.exe 3592 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1296 chrome.exe 1296 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe Token: SeShutdownPrivilege 1296 chrome.exe Token: SeCreatePagefilePrivilege 1296 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1296 wrote to memory of 1460 1296 chrome.exe 33 PID 1296 wrote to memory of 1460 1296 chrome.exe 33 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1976 1296 chrome.exe 49 PID 1296 wrote to memory of 1008 1296 chrome.exe 47 PID 1296 wrote to memory of 1008 1296 chrome.exe 47 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46 PID 1296 wrote to memory of 3760 1296 chrome.exe 46
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://wyoming.dyp.cloud/login1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff948529758,0x7ff948529768,0x7ff9485297782⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1880,i,8585358896832469683,5632953820402627505,131072 /prefetch:12⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1880,i,8585358896832469683,5632953820402627505,131072 /prefetch:12⤵PID:368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1880,i,8585358896832469683,5632953820402627505,131072 /prefetch:82⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=1880,i,8585358896832469683,5632953820402627505,131072 /prefetch:82⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1880,i,8585358896832469683,5632953820402627505,131072 /prefetch:22⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1880,i,8585358896832469683,5632953820402627505,131072 /prefetch:82⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1880,i,8585358896832469683,5632953820402627505,131072 /prefetch:82⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 --field-trial-handle=1880,i,8585358896832469683,5632953820402627505,131072 /prefetch:82⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 --field-trial-handle=1880,i,8585358896832469683,5632953820402627505,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456B
MD5af01abd82fb2e7f9a31f884b184bc2aa
SHA1e0228e758095d41ab3ba163f8851227e90ad46f7
SHA256dcf4e9a79dbb94354157912918c3f970322604e66ce4510abd987fca32d52613
SHA512f079edfcd6d69cfa57874a53d187d77b17b349723f2c7a4b96aedc5323f4b7e5cc1c55e9eaf3f724eea3192d8408d4af9e98ae271271cf1c25f5aa5180412616
-
Filesize
2KB
MD5ced83b98716b61a23300086b76827f8b
SHA168093ee1a818b00f1064f66281ccc1ce7bdc5ecb
SHA25652486f1efde7ed64443ad7f5310132112b97e6cefd68326b80f99c0bbe36b7d4
SHA512bc6b60768c322c11d9b4126c2fc4ccdfe610c4dd612e527906455147a12076f283e802427ffe0128c16ef553e125058730dddb40c9cd0fc27cc44329e6e8d3cc
-
Filesize
2KB
MD5fa6848f401ffe1bb098e56a2e1aebadf
SHA19a70abbae9a838ad5875689cc3a47b4b27049224
SHA256724791175a014bfe714d8f2dd6c35aa45819cca8f0ad1fb12cb7744ab9d34e1a
SHA512a64bf0430bbb179a20a1ded063fa6d5674910bbbee022e6954ce5e89950bebe59162c282a1a6d42508371a01b78220ad36af7e386d7a1f26572d358cc956dfe6
-
Filesize
704B
MD5ae7951d9e2ad48a1c56c77acf9dcdfac
SHA1d5c45038e519348185fdd2148cae417f4cd3251b
SHA25620203178fc5a18086e0e72697ecd838f576309d95ebf5f73c9bdb91ee9e50b08
SHA512603969984feef62f30d84df3e8513cbfd6cae1a35f1dd3f67ae21becf6c70ca3aed657d605f9d5cdba4b30752b0f1c07a517e48f0dfab674ab250737d4cf4eeb
-
Filesize
872B
MD588bcb07209aacc498afb1c6ebc94025c
SHA19b861c7501cf12bd0594dd7c451469e9e6333386
SHA256177040b7ff5c728e080c884ce4d317a32fb7ed9e46fa3fe6818488fe1d7a3afd
SHA512e76341dc3232c0ad5fd442482b704064ab24dc55c9301328d96a1763335bcc48ecb8d1e67bb500b9a122d4a2f8a811742c90d5d9fb15c39cc651664820cc9962
-
Filesize
872B
MD538035ab1aa74f6c228cd74002ccd8863
SHA1e7e9caa1da9f10f54d916aa1fc4707f300fe1b54
SHA25676263be92a18aac7c976a89e4267248f1eb21907909ce9cd8b1796f9f455f3cd
SHA512249db8a50bc307ce0688bc1e4638c8dbcc036be3f98868bb7e1556350fd4c18eb5e1415fca467a52907e15dbe4926812b6ea835d28a1529c3506a8bcd5318fd2
-
Filesize
6KB
MD5dd01ff49fac0c519baa97cc042c112e4
SHA1043a0e46a4b35e5cc41791cabd8932585fd5b1b8
SHA256d7111d96024a62b8238bf80151d15ed860b4fec4e2792802e415fad7cb9a41d4
SHA512b3a7f0b2f58145749afba95d4ee46e45aceb16f7a80214378c3ac826326a421db221161ae22ca02d586975339ade8d012880ca948eab29878fad02ac116e98cb
-
Filesize
6KB
MD5205a1aedb4c770a65c07e3f74f573f24
SHA177599a0ddb99c71381c0f3daa0b1cbd68c329525
SHA2563770e01134eb97049d27048e0200e554151bc462f4585c437e0a523338466253
SHA5125fb8981484969044a33abcfb963bced30e919a15138264655508086aa75cfa6b7c3bc70cc23f6e166156414dbd557700829c41895a46b243594151f371691ceb
-
Filesize
6KB
MD5aee14105fccbb062a300060b99ef3adb
SHA1b37598bb7c1e345c640b322b011881deafcb6720
SHA25698c7dae7fbfef67025a343c20df6932df778cc1fa59363e688b4dd8e95996606
SHA5121fc1555e0341a5a342b56d48ab679edbb23872c19815d6ab6184360c5ab98212594942175085486ce376d31c9af6ddd23080645bc66013933cffddce4dc4b4cd
-
Filesize
114KB
MD5d46b4f58791d5e0ffa3b3e1c2e9e6e57
SHA138ef4ffbfd8af166ccd5a339b2a78916a1214ea0
SHA25660d890a4010268e62d720624aae181c688df81e7aa43a0e0b40297a635678d96
SHA51282173660ea5ddca3a271220fb0f47ba04fbe7b8b35763450488119e54606038db1d8776dc51da54b38d11821f084d6420f77b9184ae719bc87716fb4ec9fd63f
-
Filesize
102KB
MD523771ec1adeb2ad803ef34119dd53b0c
SHA189a2e6635151840a62fe200af6e3c32c488e2d5d
SHA25639e4d6d47214bb508d639e8938057bcf81292f2b852371736e4401dc3fd90e8e
SHA512e669f6a265a231efb47a3252c909513a3975d9048650871c898ed13de4b07e21cd0b2eb90ba74a99351f74cc765a2e79fbbc7e5a9a5349f697a8f152b66b7636
-
Filesize
101KB
MD5bd3b43cb86917d3c8b0ba23e398987dd
SHA152b5088c036a3bbacc9de6e7c00067e8002aa6de
SHA256db27c60d1d1d113a15741cbb1060303ca97c30a9b34e3774a561767bba00c3ee
SHA512b73b7ae029b16589cd492fa43d5e8992176f674a525203ad52c102d8d737b5433a9080abdf3e8cb2338b62c2a19e6b476594ab6658811855d154f405cf8a6247
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84