Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 21:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://at0g0vcenteft.cc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://at0g0vcenteft.cc
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
https://at0g0vcenteft.cc
Resource
macos-20231201-en
General
-
Target
https://at0g0vcenteft.cc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133494807395511930" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 5512 chrome.exe 5512 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe Token: SeShutdownPrivilege 2600 chrome.exe Token: SeCreatePagefilePrivilege 2600 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe 2600 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2600 wrote to memory of 664 2600 chrome.exe 39 PID 2600 wrote to memory of 664 2600 chrome.exe 39 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 3500 2600 chrome.exe 93 PID 2600 wrote to memory of 2392 2600 chrome.exe 95 PID 2600 wrote to memory of 2392 2600 chrome.exe 95 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94 PID 2600 wrote to memory of 2664 2600 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://at0g0vcenteft.cc1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd59249758,0x7ffd59249768,0x7ffd592497782⤵PID:664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1924,i,1763071062600159806,13400151974648615688,131072 /prefetch:22⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1924,i,1763071062600159806,13400151974648615688,131072 /prefetch:82⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1924,i,1763071062600159806,13400151974648615688,131072 /prefetch:82⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1924,i,1763071062600159806,13400151974648615688,131072 /prefetch:12⤵PID:1120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1924,i,1763071062600159806,13400151974648615688,131072 /prefetch:12⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4604 --field-trial-handle=1924,i,1763071062600159806,13400151974648615688,131072 /prefetch:12⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4944 --field-trial-handle=1924,i,1763071062600159806,13400151974648615688,131072 /prefetch:12⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4780 --field-trial-handle=1924,i,1763071062600159806,13400151974648615688,131072 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 --field-trial-handle=1924,i,1763071062600159806,13400151974648615688,131072 /prefetch:82⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 --field-trial-handle=1924,i,1763071062600159806,13400151974648615688,131072 /prefetch:82⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 --field-trial-handle=1924,i,1763071062600159806,13400151974648615688,131072 /prefetch:82⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3916 --field-trial-handle=1924,i,1763071062600159806,13400151974648615688,131072 /prefetch:82⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5580 --field-trial-handle=1924,i,1763071062600159806,13400151974648615688,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5092 --field-trial-handle=1924,i,1763071062600159806,13400151974648615688,131072 /prefetch:12⤵PID:3452
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\054a255c-af2f-4919-a051-9a06dd1076b4.tmp
Filesize6KB
MD5039480aa08ef707f672f188727c6410d
SHA1d4ef551a34bb1f6ebb96e4aff5a2e5037c3e80ac
SHA256d644bac6190a15bc31f08dd88c99d41cfa032c3d58758a355b9ab6271e2eadef
SHA512f0d663db7e77f54e718ec5052b4698d4aefb585d29eb338df63f245379ddee5fa19f45914881fb95a99b45fbda7b5cf9ec8d95f736234f33a1798c24aa10cd46
-
Filesize
120B
MD55485c8ca0eec44cdf934ccf38e8cc3c1
SHA1e745fbda72b06dc17e488a5518139c0a07ddd149
SHA25695f87c1e425e959880042bbd10b737a612136d587e573e9f8d9d2ee001b945b7
SHA51267bd663d8f23a2018284650d825d06572970841b54ed40ef05a7e6a4c8e6e6a36a9f95b83385ded8c25cff0df21f470fba47eab29f2f52ec26a123d53efb0329
-
Filesize
2KB
MD5d621e32e032950e077a6d27ab8763622
SHA11fd551d78b2e80f887bf20f5e31758964ea68bcc
SHA25689ff6bdb954c97d21c07f8213e7226389ea19123f38aecbdec1e8dce03dc7c3e
SHA51236f594db0421b3d1ede9973dc5e100511783d59b4ca05a0f347de1e7c1a2494f7c7c454499f1dfaf2a300daf997d5d265bb6fe04676a9415b9ac97fd8d1eb25b
-
Filesize
115KB
MD50cd2136ee0430e5813dab80c7adac68a
SHA15a42c2d5dbb475dae299bb3ec93adf98f4bc4c71
SHA256bf5709992744d3b93f9f446561bf9532b22fe0b6838a279fae9e2c8dbd8c19b0
SHA5124e8459227e3ce392696c96322d41b52a1072efaff1f57241aee3d99706e6ab088b00825b71c00d33a39cc6977f8ce0be7341cc0c4b9b56fbbc15b63016b74ad6
-
Filesize
115KB
MD5ed197b56804bc9647d501729f98b68b8
SHA16e945c8c99c463f8a4ec494b078afd42f4fddd2e
SHA2562acc6381df0a609e9d17b39d71255822ee9f88f9d707eece8a93419e9d3365aa
SHA5127969f907c191b8638eb4073988112899939defd2ad206e13272bf161efa84b3cdc56dd0f22edd1a4ae5ae840069fa1dc674cce547c3acb241156fa368e2bd546
-
Filesize
168KB
MD53f19682a02c5e16844eb9dc85af546c5
SHA183783fd2343be8bec48c5e869a409bb603d18339
SHA256dc48f2949b1c8339bd31a0a1f06fca51e3eedd1cb02eae2a1cdcd558220ffa08
SHA512256badfa15f49d39a57fd921c3efe5148529973b583dca5b22c9216e5756042894cef86c8a5a4ab06696f6c2180460eb992be6642feb664da1ba3428f4f16519
-
Filesize
116KB
MD56c428ecce247a357ed8af370448eea96
SHA1d8861137dc5b37c206aafc347aa5afb3fe51bc5c
SHA2567311f41daae7fcd4007ae55679ede6f8aebd3aa510fb60da987797aee6c6b570
SHA512449417c625e30512d845c7b604f52217f3c3f32816413899f8b1f3c826edcd9ecbb0ea7094e4a4f0f871dbf2ac99ae5e674de28d66ffe6f9b12508bfa0d4d591
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd