Analysis
-
max time kernel
29s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 01:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gem.godaddy.com/signups/activate/MS0tRDBtQnJ1NUd6MGRVaVl3K1YxRkhaZ3doOEpRdmZTcXBEMHF2ZVhOeUdNdDFJa0EvSFoxSStoVGVyTTR3NjV5RWVUcE04U3JKUmRtUHJSSG1RV2pheTkvMlE0U0djWFhLWXVBPS0tdWp4VlM0N3BQZGVIeTFzYy0tU2hxV2Uxa0IrTmJqdHU5bWRETUg2UT09?signup=10182056
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://gem.godaddy.com/signups/activate/MS0tRDBtQnJ1NUd6MGRVaVl3K1YxRkhaZ3doOEpRdmZTcXBEMHF2ZVhOeUdNdDFJa0EvSFoxSStoVGVyTTR3NjV5RWVUcE04U3JKUmRtUHJSSG1RV2pheTkvMlE0U0djWFhLWXVBPS0tdWp4VlM0N3BQZGVIeTFzYy0tU2hxV2Uxa0IrTmJqdHU5bWRETUg2UT09?signup=10182056
Resource
win10v2004-20231215-en
General
-
Target
https://gem.godaddy.com/signups/activate/MS0tRDBtQnJ1NUd6MGRVaVl3K1YxRkhaZ3doOEpRdmZTcXBEMHF2ZVhOeUdNdDFJa0EvSFoxSStoVGVyTTR3NjV5RWVUcE04U3JKUmRtUHJSSG1RV2pheTkvMlE0U0djWFhLWXVBPS0tdWp4VlM0N3BQZGVIeTFzYy0tU2hxV2Uxa0IrTmJqdHU5bWRETUg2UT09?signup=10182056
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2180 chrome.exe 2180 chrome.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe Token: SeShutdownPrivilege 2180 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2764 2180 chrome.exe 28 PID 2180 wrote to memory of 2764 2180 chrome.exe 28 PID 2180 wrote to memory of 2764 2180 chrome.exe 28 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2736 2180 chrome.exe 30 PID 2180 wrote to memory of 2088 2180 chrome.exe 31 PID 2180 wrote to memory of 2088 2180 chrome.exe 31 PID 2180 wrote to memory of 2088 2180 chrome.exe 31 PID 2180 wrote to memory of 2748 2180 chrome.exe 32 PID 2180 wrote to memory of 2748 2180 chrome.exe 32 PID 2180 wrote to memory of 2748 2180 chrome.exe 32 PID 2180 wrote to memory of 2748 2180 chrome.exe 32 PID 2180 wrote to memory of 2748 2180 chrome.exe 32 PID 2180 wrote to memory of 2748 2180 chrome.exe 32 PID 2180 wrote to memory of 2748 2180 chrome.exe 32 PID 2180 wrote to memory of 2748 2180 chrome.exe 32 PID 2180 wrote to memory of 2748 2180 chrome.exe 32 PID 2180 wrote to memory of 2748 2180 chrome.exe 32 PID 2180 wrote to memory of 2748 2180 chrome.exe 32 PID 2180 wrote to memory of 2748 2180 chrome.exe 32 PID 2180 wrote to memory of 2748 2180 chrome.exe 32 PID 2180 wrote to memory of 2748 2180 chrome.exe 32 PID 2180 wrote to memory of 2748 2180 chrome.exe 32 PID 2180 wrote to memory of 2748 2180 chrome.exe 32 PID 2180 wrote to memory of 2748 2180 chrome.exe 32 PID 2180 wrote to memory of 2748 2180 chrome.exe 32 PID 2180 wrote to memory of 2748 2180 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gem.godaddy.com/signups/activate/MS0tRDBtQnJ1NUd6MGRVaVl3K1YxRkhaZ3doOEpRdmZTcXBEMHF2ZVhOeUdNdDFJa0EvSFoxSStoVGVyTTR3NjV5RWVUcE04U3JKUmRtUHJSSG1RV2pheTkvMlE0U0djWFhLWXVBPS0tdWp4VlM0N3BQZGVIeTFzYy0tU2hxV2Uxa0IrTmJqdHU5bWRETUg2UT09?signup=101820561⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6cb9758,0x7fef6cb9768,0x7fef6cb97782⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1124 --field-trial-handle=1324,i,5589148537203908164,8193829045268803695,131072 /prefetch:22⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1468 --field-trial-handle=1324,i,5589148537203908164,8193829045268803695,131072 /prefetch:82⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1544 --field-trial-handle=1324,i,5589148537203908164,8193829045268803695,131072 /prefetch:82⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2260 --field-trial-handle=1324,i,5589148537203908164,8193829045268803695,131072 /prefetch:12⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2252 --field-trial-handle=1324,i,5589148537203908164,8193829045268803695,131072 /prefetch:12⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1368 --field-trial-handle=1324,i,5589148537203908164,8193829045268803695,131072 /prefetch:22⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3396 --field-trial-handle=1324,i,5589148537203908164,8193829045268803695,131072 /prefetch:82⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3504 --field-trial-handle=1324,i,5589148537203908164,8193829045268803695,131072 /prefetch:12⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2576 --field-trial-handle=1324,i,5589148537203908164,8193829045268803695,131072 /prefetch:12⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3212 --field-trial-handle=1324,i,5589148537203908164,8193829045268803695,131072 /prefetch:12⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c51a4614532ae263a4ef9de39b3bf31f
SHA1a801cbd4d1cfced65cbf8e2cff9d871c5863dce9
SHA2566cb614c7a667d87b8b038e1a20d761d13cab1f72eb4c8c2b2a2528f9d06152ed
SHA512dec48030a0737a40bfb1d83df0b5413c9390787c13bdda03d317e4ad546f8e839811b3ca5aefd7f1b83bbee3c97d24b2b54905c2c5b06472ef7f5016a88cb2fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7c106540e2b86f5128dd4625d659b40
SHA1ce8ce4196d8560e2461942d7819801f4f86f0f36
SHA25608881e7cf3ded9e2b4d263aa0de2b7f0250785ba412468cf40915cb2db36d35a
SHA51229ed67189eefe25a5833b361d0deca13357215d69c2f669da3b8b558757fe26cc3b0ed80e7ff6dd801c3856a1acbbab9afa0dcca6a0888e9c8705f352e8d3824
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD519e243c47dedcf2df75c10a158657419
SHA19f2845eb265d55b93a4a4a236daee295d3ad633d
SHA256adeae827fcda61e5db29bbc6de3c027a3b850afb84f73cd1e76d58df9d8fe7ec
SHA5121842e110c6dddfe31690f08c6ec8ce9f26bd9a35301d7e86bd0b35057df9bb742840398561504cb22ab0297e02bf2fb5899cf3a7b78b76617c8189ddfacb61ee
-
Filesize
4KB
MD58e2346b6bff4f97d4e328caaeef93ae4
SHA166daee8fbf0fbbbf0c4e61a453fc12b8abd1821c
SHA25699f89ddc2db2cc607e2369a4ee8dc9303771cdca20d05f04fd41e5e1e79b7e1b
SHA51289d8998ffde008bdd39243932940ad0def802a40cdbdfe08f8f9d02e8fe32e3de770e2d1841801a3481ae5ea484107693e00814be726f541b50409c8dcec3bb9
-
Filesize
5KB
MD5e91d893d14b15c72f240fa80fea442bd
SHA12d7edc10689010fb13c2153ad0b4a79305aac77d
SHA256660cd2a4bcca00eb2343585c40ccdcdffad87c8a1d2c0a5ddec918bf87dbc7cc
SHA5123f91a001f19fdec824488ceef0ebb7d8f7974b7e290251c319a901ae41d648f1ad29a6fcda70dd1af058ef77b3ab7116b9dce7815b0344bd841040d878c4435d
-
Filesize
5KB
MD530ac04b2990b01a2fc4e6faf30751739
SHA146401e444baac61b530304b58e8a93cdb5b8cbab
SHA256e7f1557094b5faa0bac6b5e865cd83a2bf6b83f16f26ed85f8ff256600ef57d2
SHA5126fd7988f8dabe1bdd90edd65145f2eefff4da5f7f437036838a1c744b31699e7f70fc5141d02fd6fa3910cac0a7b92daf7b0053d70cadfc4856fb0d75118f1d3
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06