Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 03:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://qjn4modo51c.typeform.com/to/hPinrT2J
Resource
win10v2004-20231222-en
General
-
Target
https://qjn4modo51c.typeform.com/to/hPinrT2J
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133523541449769597" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 836 chrome.exe 836 chrome.exe 2720 chrome.exe 2720 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 836 chrome.exe 836 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe Token: SeShutdownPrivilege 836 chrome.exe Token: SeCreatePagefilePrivilege 836 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe 836 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 836 wrote to memory of 2608 836 chrome.exe 85 PID 836 wrote to memory of 2608 836 chrome.exe 85 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 2716 836 chrome.exe 87 PID 836 wrote to memory of 3116 836 chrome.exe 88 PID 836 wrote to memory of 3116 836 chrome.exe 88 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89 PID 836 wrote to memory of 1752 836 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://qjn4modo51c.typeform.com/to/hPinrT2J1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff870129758,0x7ff870129768,0x7ff8701297782⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1884,i,12718308048692339292,5668705825588068726,131072 /prefetch:22⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1884,i,12718308048692339292,5668705825588068726,131072 /prefetch:82⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1884,i,12718308048692339292,5668705825588068726,131072 /prefetch:82⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2776 --field-trial-handle=1884,i,12718308048692339292,5668705825588068726,131072 /prefetch:12⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2768 --field-trial-handle=1884,i,12718308048692339292,5668705825588068726,131072 /prefetch:12⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1884,i,12718308048692339292,5668705825588068726,131072 /prefetch:82⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 --field-trial-handle=1884,i,12718308048692339292,5668705825588068726,131072 /prefetch:82⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4728 --field-trial-handle=1884,i,12718308048692339292,5668705825588068726,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD5c8960c00a751bb7281ece275b63ffff8
SHA14aa3592d239c0f85c409df0fb05d39d09810fc75
SHA2569865b4e0d61a0726e8f260e92f64d1b5f80522caa3920ffe8c8a09601ed1fd5a
SHA51249890f0160b3eb9681a3b78053493930c3ba3d6a2019d5409ed641e3bd3ea81d0d7acd8d869f5dcefdf9bafddeb92efe6569948850a6eb991169d2db5dae3a32
-
Filesize
408B
MD5514a53403d6b7268754b20a5e8967e94
SHA11ff74c0d683abbbb77628f4a3fcac522180ffb85
SHA256517fcd7b29ba28df4085307fb071439c16d52901e82074f888d119fa05cc3a50
SHA5124733c2eac3c1a01aee3d99a90476f70a05620f773252deb7ceb5429404b7fe6ba6e5f702851d0a308db14f26039f38eec37276042ed806223f7f4f7e2a68d89b
-
Filesize
240B
MD562d9e40c85fab483923e85931fea1b97
SHA1cf5c33e2a11f64c06b4dc2ef9e6b6624eed21144
SHA256a228a76b17f7045190090faf220aac172b659da45fd2ca34c83b70474597ea34
SHA5127e6ff7de2e241a49f290997177d4b9f54862c498a18e6202d52edcb266f4ff986aa0136ae8b250ef70e565af653caf031dd0524534dc539686fd0e31a5dc7807
-
Filesize
1KB
MD5a06d3a439c2c17e126c1da4f2dcae2fc
SHA1dba2296d2344845f8d81946b9e5edb7bb77da1c5
SHA256b1b485c5d26d4bdd6c2cc48c4c79a52e1349f0549d685550d810ab3bd83e9024
SHA51226806491139e015f81a1bd26a26648fb65dfc93da686e0d02384d5015e2ee9ce49425ef25307c537b6aa8107f2402dd781b9164222bc265e39d3cff07ceccf78
-
Filesize
872B
MD584695f07d164869f4282bad2273e1129
SHA1e89ac24ad31c30d67d3ace2ccfa4f57b5bcb8878
SHA256816ecdb0dd7652c61fb5de12bbb04a1badd48645dadcd77dd26ca834be2ca50a
SHA512a5113fa85bfadaa91af8f81c787656a390f481b1577cac32ba7dd800e62340662e222f08b6df0382bae05062dabafd75476e87a2811b6789a3d67750f3828bdc
-
Filesize
872B
MD5527ce1afa8c8436d4b03d6bd11e2aa65
SHA12ac3b94320bb9cb2ee0eaf89983c9f2b7f73f8ea
SHA2560ac2187b5daeda9f607602c671deedd7f05e7773dc7ba41a8a51eb0928661e3d
SHA5128e34e7ad25d7329b55a35d97180787579c9eadc94989e4a8ad07337c7a3e295e34790faec35975b02bccfc08f048b47dac5314218ae80e6c57be58bff9896f18
-
Filesize
872B
MD552dab690bad4fa8cb730b9da167e7bde
SHA135455cb8ee7da8d7e57d298c0bae6ff4824ad436
SHA25607d4051745bc82b00e5a165ef0b84005990f469dd441f6e2e53e86001b807546
SHA512f57e16ae9df1496a5861716ab8cfd715ad28d931e5743ec038e040738b8cb99d59cd9759e43b1f31a9b9d56605d460cc54a7048a1b4c1fb5d66007482645b785
-
Filesize
872B
MD563eb8b46aec639e3403d6ced34d37c5d
SHA1391ca8d6609fa9f18e0de7a9c53a3c0ffaebbbc7
SHA256de5fcc0d883eafc476e15b93259ce7fc6e6a743905d5082b204ba22494fca1cb
SHA51254350f0b9025928c57faca2de2391757c922b162357a007f0786bb610ce326a18501c51c019f8b08085095d09b6acf14be3a0fb0c6e4c7570734121a8604f4b4
-
Filesize
872B
MD59a1e90f2fcc479ae66075b85939fffc0
SHA13067a1b85e84185527bd15d23e9bb1a8b940abf4
SHA2562f14ff159ec11ea13cbdfd3b8fcfd0acae99583c0b476ade4e5dd510bd69c545
SHA5126330e787776cb49aa8b7ca36d2839d84dab5c1523e3cde34b222ac86223cd5594d7e7078088cf4d3c6bb236112ae06e7cc13ffa41d59602a914da3afc3b9eb33
-
Filesize
872B
MD5cedbabcc28ca8409a0ac741748891b5c
SHA1e999a8193aaf43538415e94a0ba5f2b0569627ef
SHA256b9eca9508a393e16383368ccd2b2d907c0f80314f47d89a0fb3fc8fdb4cdeb4f
SHA512c464d33606b554915470caf64b09464c5b1345a88b20f0b03286836854569f9dcdec6c8825acfa65613e98f72dc71b3009a6b8c38c19dcd1c7cc4a5cd4002aea
-
Filesize
705B
MD521584adc15fb7fc55054ad4fcb2fefdb
SHA15e2f6daad66af131e82a75f87a3ebf862cdb2e47
SHA256cc9e1652e96ee069e038bcff8d643878010ded2b14a59ec6a32d0067300daf0c
SHA512453b65a62d763ad4337b8c5c449bea07c17e0341db782f8c907e2c8bc0c50d1bae2c959a3e4ff3cabaddad6871bd088cf6c152196bb0ceee603e740bb27e7130
-
Filesize
6KB
MD5272185ab23ef91033b33dcbf699df879
SHA12c2deb82eac349ce49813d0fd56dab27ddafd91c
SHA256e455f3b205f4e778da54fb3a68fc7bd3bd29a49cda1bf63b8104f0dba5280fd5
SHA5127a1933d16fd461293d4646f07adeb2babfb531196d30d75c46a9cc9a38c2590c6308a045651d800e4791643395ed9ff58d39acc6bed24df1443a63dae554cce8
-
Filesize
6KB
MD5d37a9655bd40f4fa1226ac14b460281c
SHA10d558aaaef7e2ea007430139950854c87b14dac8
SHA256ea949e2c547ca931e599769206a2facf9d2f04f4e5411bba9e7ce067a7f8b9dd
SHA5126fdbe2d08625178cca8b94f12cee2fd38d8b00423317b22027175ad861967eef3db1715762b9abe57692c8e0d9790d29d582a84829ccefd8ee5b7ab90136db1e
-
Filesize
6KB
MD5d6eba349750f00a64cfc5683590432b6
SHA1b4d3b34c41070512f822369066b80dd4d788586c
SHA256c4e9ebea12686890cc81849d4f911ec44542de1eabca42157583c51c1fef14da
SHA512d894d253b475c7ac7e22a10e9bc934e40367e3e83430cabe7aaf58a16cc11038de645c095de3937f656b1689b0017e536e41fab23a462829b767b76acda65a26
-
Filesize
114KB
MD5c6d7056aec43b26bb35c3956c48733be
SHA14f5cf2c006103e093eded23220baed8c43645e0e
SHA256e7071b22284783bd6f507b674ed25fb60d9da953384811357675ef708dad36de
SHA5129f963997e450a71d69e2eda51e73916c7d14a0a2ab78e1afc3fab0b306c07114793f62f30de596f66af92b5c98e12c962788b0b7b53c334ce222966b56188841
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd