Analysis
-
max time kernel
299s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 05:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://analyticsinhr.lt.acemlnb.com/Prod/link-tracker?redirectUrl=aHR0cHMlM0ElMkYlMkZ3d3cuYWloci5jb20lMkZibG9nJTJGMzAtNjAtOTAtZGF5LXBsYW4tdGVtcGxhdGUlMkYlM0Z1dG1fc291cmNlJTNEYWN0aXZlY2FtcGFpZ24lMjZ1dG1fbWVkaXVtJTNEZW1haWwlMjZ1dG1fY2FtcGFpZ24lM0R2YWx1ZSUyNnV0bV9jb250ZW50JTNEMzAtNjAtOTAtZGF5JTI2dXRtX3NvdXJjZSUzREFjdGl2
Resource
win10v2004-20231215-en
General
-
Target
https://analyticsinhr.lt.acemlnb.com/Prod/link-tracker?redirectUrl=aHR0cHMlM0ElMkYlMkZ3d3cuYWloci5jb20lMkZibG9nJTJGMzAtNjAtOTAtZGF5LXBsYW4tdGVtcGxhdGUlMkYlM0Z1dG1fc291cmNlJTNEYWN0aXZlY2FtcGFpZ24lMjZ1dG1fbWVkaXVtJTNEZW1haWwlMjZ1dG1fY2FtcGFpZ24lM0R2YWx1ZSUyNnV0bV9jb250ZW50JTNEMzAtNjAtOTAtZGF5JTI2dXRtX3NvdXJjZSUzREFjdGl2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133494263082158602" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 3888 chrome.exe 3888 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4276 wrote to memory of 4316 4276 chrome.exe 16 PID 4276 wrote to memory of 4316 4276 chrome.exe 16 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 4520 4276 chrome.exe 27 PID 4276 wrote to memory of 220 4276 chrome.exe 33 PID 4276 wrote to memory of 220 4276 chrome.exe 33 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32 PID 4276 wrote to memory of 5024 4276 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://analyticsinhr.lt.acemlnb.com/Prod/link-tracker?redirectUrl=aHR0cHMlM0ElMkYlMkZ3d3cuYWloci5jb20lMkZibG9nJTJGMzAtNjAtOTAtZGF5LXBsYW4tdGVtcGxhdGUlMkYlM0Z1dG1fc291cmNlJTNEYWN0aXZlY2FtcGFpZ24lMjZ1dG1fbWVkaXVtJTNEZW1haWwlMjZ1dG1fY2FtcGFpZ24lM0R2YWx1ZSUyNnV0bV9jb250ZW50JTNEMzAtNjAtOTAtZGF5JTI2dXRtX3NvdXJjZSUzREFjdGl21⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaed209758,0x7ffaed209768,0x7ffaed2097782⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1932,i,9577202757569576238,12837231687820624609,131072 /prefetch:22⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2964 --field-trial-handle=1932,i,9577202757569576238,12837231687820624609,131072 /prefetch:12⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1932,i,9577202757569576238,12837231687820624609,131072 /prefetch:12⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1932,i,9577202757569576238,12837231687820624609,131072 /prefetch:82⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1932,i,9577202757569576238,12837231687820624609,131072 /prefetch:82⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3916 --field-trial-handle=1932,i,9577202757569576238,12837231687820624609,131072 /prefetch:12⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 --field-trial-handle=1932,i,9577202757569576238,12837231687820624609,131072 /prefetch:82⤵PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 --field-trial-handle=1932,i,9577202757569576238,12837231687820624609,131072 /prefetch:82⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3884 --field-trial-handle=1932,i,9577202757569576238,12837231687820624609,131072 /prefetch:82⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 --field-trial-handle=1932,i,9577202757569576238,12837231687820624609,131072 /prefetch:82⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5136 --field-trial-handle=1932,i,9577202757569576238,12837231687820624609,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3888
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5877258ddddc2a7e609c401f12b0b140f
SHA1d3ebc31d9dc769ad257dff62eb1d309bc713b8a0
SHA256ac4556582432e7249786ba1299ba65c99b4fe4d5d2e1fa53f68b27dc4bc2fa65
SHA5120579e2f319807ca95dc4f8388f28da2938d88f071b1870229daab1a2b5bf16e8500c53c2768b1d6fc036437cddfa71a9791ee83482688cc004a2cbea9c2ef941
-
Filesize
6KB
MD5fef59b84da0324d8f5695082c31d969b
SHA1f38e052b0c21511020e50cc3b2cbcd1ceb3db315
SHA256011f02a33cb62beb6ab2335eec289d5bb90ec10916ac8fcc20278ee2a17ad428
SHA5123aa4c5056f8ced61f9a4b4aa1d890528f9a5ac6e16bdc38f1b14ce840baa584ee919aaa7ca6e6e3ed30b7b12157a219fa32f575a7ca0358734edb7b9f1187b12
-
Filesize
6KB
MD58acd308af90f85a4b4859486b9b1a581
SHA11cb8167a600efa33f94bd7e71cd6fba48fe53469
SHA2567cb7c8d38711127ca0f562f50fdb3e71a73f69210a1e49492a6a144aa1de4fcd
SHA5122fd8a6ddaf0a4321b5cd7d17e4ba9d6322567a55870ef762c1dcc33704648b58926947adb317889b156f2a56baeaea7145257e9d3e511f5dbc8bbfd597832262
-
Filesize
176KB
MD53748da5ff51be8c77c7a70ef3539afd5
SHA14753f09614167cf65a37d9abf834d8435358c8b3
SHA256992839e73e3acfdab23f0442b2b14542ef89af5e143d6ef161f5f4f1394a897c
SHA5126c0c8d8b230c6501f6b223c408450f29a7c935f63065bdb294460d8530df5b11226842eca4e668de0b46acd305861597d5a332597bc8f5f5861e6b926e9f47c2
-
Filesize
115KB
MD5ee59470af9c33413098ff6334c55d2fc
SHA1a9b633c205f7187ea4838dd9b67deb47eadc1f58
SHA2565b9e84af81b605e9377a31041a9848758f3f5f9f8139e8a3425bf9d0419abbb0
SHA512e94eac3f127eb6dd0452113fa942620ba0caed8e4b972a0d72cbf14db1b180947aba4cbce81d7a8810b58baf35231a576f720278732cfa39569a450773521ed4
-
Filesize
11KB
MD5dc78c877b5fce088963386b39e06ede8
SHA18151e9982d4106857b787e0067a25fc7721da6be
SHA2569c49bc821a614f7d7f76174d9666ca41b128454d188e278d01962f392fd811f8
SHA512e1dd15b9a085ca2b88d86fe6476d772cbf531246e0660f49117c2e5f6786d905211cf4439bb426745015e852ea3eb33911ba34ec48dd538ddfc14ab242e466bf
-
Filesize
115KB
MD52b121b31cadf5525ad22db47ca6afddc
SHA18b424bf25993f9cff2013b4edb0d070ed2530b0f
SHA25673d961372c35340936f6cadbbe1265fd090b396e7b19ab950021081721dcac74
SHA512303e8be74d7aafc42001d0bf0b983ca671b12e8ecdc5d262b6daf82707789a1c5bef3a4960be9a0d98a7881149fd45143777a9297391b005f46fd0dd2c1088ee
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd