Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-01-2024 10:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r20.rs6.net/tn.jsp?f=00133NV99PQPJecAzIzWGgVuixjxKCaU7nejxmBiYdv4u_3xn931Ewg0TD4pNgoZg7ufy924CAy2UAm9ghdnUtWFx6jpa81Ktk1JhHV6fCGcxjMkZvO8wMqxpVubFwJC1j2K0S757KOOrle5Qbws4fD3A==&c=&ch=/&__=/asRw/t92YuAXdvJ3Zu9Wag8863637A74796D6D65786E25627F6C656E6E616860
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
https://r20.rs6.net/tn.jsp?f=00133NV99PQPJecAzIzWGgVuixjxKCaU7nejxmBiYdv4u_3xn931Ewg0TD4pNgoZg7ufy924CAy2UAm9ghdnUtWFx6jpa81Ktk1JhHV6fCGcxjMkZvO8wMqxpVubFwJC1j2K0S757KOOrle5Qbws4fD3A==&c=&ch=/&__=/asRw/t92YuAXdvJ3Zu9Wag8863637A74796D6D65786E25627F6C656E6E616860
Resource
win11-20231215-en
General
-
Target
https://r20.rs6.net/tn.jsp?f=00133NV99PQPJecAzIzWGgVuixjxKCaU7nejxmBiYdv4u_3xn931Ewg0TD4pNgoZg7ufy924CAy2UAm9ghdnUtWFx6jpa81Ktk1JhHV6fCGcxjMkZvO8wMqxpVubFwJC1j2K0S757KOOrle5Qbws4fD3A==&c=&ch=/&__=/asRw/t92YuAXdvJ3Zu9Wag8863637A74796D6D65786E25627F6C656E6E616860
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133494413691401099" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3372 chrome.exe 3372 chrome.exe 1280 chrome.exe 1280 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe Token: SeShutdownPrivilege 3372 chrome.exe Token: SeCreatePagefilePrivilege 3372 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe 3372 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3372 wrote to memory of 1140 3372 chrome.exe 62 PID 3372 wrote to memory of 1140 3372 chrome.exe 62 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 2856 3372 chrome.exe 85 PID 3372 wrote to memory of 1804 3372 chrome.exe 83 PID 3372 wrote to memory of 1804 3372 chrome.exe 83 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84 PID 3372 wrote to memory of 3004 3372 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://r20.rs6.net/tn.jsp?f=00133NV99PQPJecAzIzWGgVuixjxKCaU7nejxmBiYdv4u_3xn931Ewg0TD4pNgoZg7ufy924CAy2UAm9ghdnUtWFx6jpa81Ktk1JhHV6fCGcxjMkZvO8wMqxpVubFwJC1j2K0S757KOOrle5Qbws4fD3A==&c=&ch=/&__=/asRw/t92YuAXdvJ3Zu9Wag8863637A74796D6D65786E25627F6C656E6E6168601⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd23c49758,0x7ffd23c49768,0x7ffd23c497782⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1956 --field-trial-handle=1820,i,7471011152364999714,355158044079667424,131072 /prefetch:82⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2152 --field-trial-handle=1820,i,7471011152364999714,355158044079667424,131072 /prefetch:82⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1820,i,7471011152364999714,355158044079667424,131072 /prefetch:22⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3308 --field-trial-handle=1820,i,7471011152364999714,355158044079667424,131072 /prefetch:12⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1820,i,7471011152364999714,355158044079667424,131072 /prefetch:12⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 --field-trial-handle=1820,i,7471011152364999714,355158044079667424,131072 /prefetch:82⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4628 --field-trial-handle=1820,i,7471011152364999714,355158044079667424,131072 /prefetch:12⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5344 --field-trial-handle=1820,i,7471011152364999714,355158044079667424,131072 /prefetch:12⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 --field-trial-handle=1820,i,7471011152364999714,355158044079667424,131072 /prefetch:82⤵PID:668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5464 --field-trial-handle=1820,i,7471011152364999714,355158044079667424,131072 /prefetch:12⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3216 --field-trial-handle=1820,i,7471011152364999714,355158044079667424,131072 /prefetch:12⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5532 --field-trial-handle=1820,i,7471011152364999714,355158044079667424,131072 /prefetch:12⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 --field-trial-handle=1820,i,7471011152364999714,355158044079667424,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5060 --field-trial-handle=1820,i,7471011152364999714,355158044079667424,131072 /prefetch:12⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD549b35deec6d94859249b57b9ade3be13
SHA148012c4931ccbe0bc8392f1c011bc4c3909bfd91
SHA256632cbd215410111ced8bd13d1bfb5f36e08c294d4f39a0ba80773d0d151854e5
SHA5126ded0322e4f4d2384e196451d3bb8fedd8ed769a7448a18315e0696559fd2f14e433e8f294e4bc7134a372d480855760903cd789b9c2b0c67aedf9aa98b8b93a
-
Filesize
2KB
MD55c3d819d97a7b92abbe1aaf2aa9df9d9
SHA12bc0b662735cdf6e4892a6ba3aae9efe913982e9
SHA256d15f1179124e3f1f118b44aa36ce3b7362537db0053228237c7e34b933a47f76
SHA512c04e639815c895fab6648566a3034322206110e68a383d4d7c040aa931fc33118f4711667d9c928cc5b8dc32cf38c440953f67da953c73ec9c04d66344c5fcdf
-
Filesize
6KB
MD575a7258ffbf85620d3f77867cc28cb51
SHA113e5388456bc18318b8f419018ba3b927c18da74
SHA25693a679dc75391ca317deba812dc845be875f5d76d6a7d9b156ce92575d08053d
SHA5125ad9756c9a5772ead8ace319b6b70d2ad41a79b447360bc4187e6515f02f41b0dd2680ea118d0883a5382ccc497b33d94fe18d34c6ae530f3cd2a977f29c8e49
-
Filesize
114KB
MD5bba024c4888e11d0983f87be5be9086c
SHA1e8805b04f6fdf434f83250b6e9bf4aa0e8f5c3cf
SHA2564412b017a3fb300a0a58aa7c036d4a212631f7d67d0f40441401dc2bbe98a4b5
SHA512f66236cab8aac58c22bf074d00b5e687b4181374188ab51c6a975af7a5348fb4da52583caa94db9d0da463954b618aaa119091ffc99cb8b74955ca49f92c1aaa
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd