Analysis
-
max time kernel
300s -
max time network
290s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2024 13:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://212.30.36.86
Resource
win10v2004-20231215-en
General
-
Target
http://212.30.36.86
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133528226368464064" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 3348 chrome.exe 3348 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe Token: SeShutdownPrivilege 5048 chrome.exe Token: SeCreatePagefilePrivilege 5048 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe 5048 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5048 wrote to memory of 1044 5048 chrome.exe 22 PID 5048 wrote to memory of 1044 5048 chrome.exe 22 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 3620 5048 chrome.exe 89 PID 5048 wrote to memory of 1572 5048 chrome.exe 90 PID 5048 wrote to memory of 1572 5048 chrome.exe 90 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91 PID 5048 wrote to memory of 2568 5048 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://212.30.36.861⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb80799758,0x7ffb80799768,0x7ffb807997782⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1976,i,13219435270161471553,11861601601782630505,131072 /prefetch:22⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1568 --field-trial-handle=1976,i,13219435270161471553,11861601601782630505,131072 /prefetch:82⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1976,i,13219435270161471553,11861601601782630505,131072 /prefetch:82⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2924 --field-trial-handle=1976,i,13219435270161471553,11861601601782630505,131072 /prefetch:12⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2916 --field-trial-handle=1976,i,13219435270161471553,11861601601782630505,131072 /prefetch:12⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 --field-trial-handle=1976,i,13219435270161471553,11861601601782630505,131072 /prefetch:82⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1976,i,13219435270161471553,11861601601782630505,131072 /prefetch:82⤵PID:328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4756 --field-trial-handle=1976,i,13219435270161471553,11861601601782630505,131072 /prefetch:12⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4732 --field-trial-handle=1976,i,13219435270161471553,11861601601782630505,131072 /prefetch:12⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1976,i,13219435270161471553,11861601601782630505,131072 /prefetch:82⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1976,i,13219435270161471553,11861601601782630505,131072 /prefetch:82⤵PID:528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4696 --field-trial-handle=1976,i,13219435270161471553,11861601601782630505,131072 /prefetch:12⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4648 --field-trial-handle=1976,i,13219435270161471553,11861601601782630505,131072 /prefetch:12⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1976,i,13219435270161471553,11861601601782630505,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2740 --field-trial-handle=1976,i,13219435270161471553,11861601601782630505,131072 /prefetch:12⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
822B
MD539f3fcb6c18e899d598cab75b40f4e68
SHA164b0ad3201a923810f54cd10f2f76042860fcc67
SHA256647e365be4ce379ad4455bedcf25d57c2bab01cc6396545292fd79dafb2b3e16
SHA5125eaea86d6b890ffd86b12277a8b7a9f6c478ebfafeb63c313b23111ab2b79059c12a916616cc69649d3786b01b3b64b22f987fef868e116b46546ba127b7d567
-
Filesize
6KB
MD5940f68c914224957b995e600f6e1721c
SHA164eaf2ebd877fcd65df8cec1e950212ea46cd09d
SHA25627fd8038e23c0ca7c66813ffa717503055611ab6873e379a992e94b49d1a589b
SHA512d9e433e4e1d6879fb381fb0afe7ead6ae0cc6a10a1fdc3268993da6ed1a70008047b42a0236a239e44a3be711eb2eb77d1726edf3b89b0abaf06129be0059bf3
-
Filesize
6KB
MD512a7d4b9dc021fe6d56506cb28d5f73f
SHA1475118e2e46e2614f53aecfc019adfc07a234a46
SHA256945c754542820bb2ffb69797e37da33ee807fe422e89a6dfb5c7c21a7e639c31
SHA512a523afe88d9277bc20f187f355c8e0c5c620a4b2aeca1f5fc63185e7e13a949aa5b3a2345b56cb663a29ced70476e25da26c06acda1de658f0355952f583e042
-
Filesize
135KB
MD54d657d5e0118741926299c6ceceabea1
SHA1b7cf29aca8d1034d37ff731af21b47a3aa78204e
SHA2565f9b31067ab4dd6011a351d0e074aad1c1593908d959e42dd40211d707371d18
SHA512d5bea95dcf8838c33558dbc5294b9fb4a5c064ed57205fe94cefd30a2eb7dddf96a871015a8779715738b10b00676673b1d9f7533a37ac4d633de48b3e5f504c
-
Filesize
116KB
MD5cb52ce6478b100cd6ec5b03b2f093ca4
SHA14af5a858b88405e0c22358b97c642be06a0e4269
SHA25614afea35c784b574162746a0c1729a8c8af8b002075365e524f3750f2062a087
SHA51289ba6ef92d34bb466d597ec59bf50414d71ccc04d76780e0a62d59d5f818c5dcdffc5cd7746e920ba9b6e7d0bd4289e4dddbdb5034bd79754544fad43b481ed5
-
Filesize
115KB
MD5331098edea88ba48770e6c8c9ab309f0
SHA12eafe5bb99dff3bfe9da9c847a35b79bbda9c65d
SHA256737621935456f40d0d6145c5bf650506620a9d09fa64329b98c8200c1c3b1bbe
SHA5124fd5056260934ab4cf8d25303c41d30155a7bde98794f7c8d596a4de14916574a476ff19c681cf55515fecd6d9b195e26a5b5219a509ab92769c11249a42d497
-
Filesize
115KB
MD5b138ea4b6cd312a63e11237de2b1a307
SHA184d3d984fa473c362d699c035434493e947aef85
SHA256669a78d73cec85390b145e2fee5135c72c20153d18e91175b83c694f52b7b7b9
SHA5123e2c0217ce3f10c5d0f73fa4476bd7ea527c931647540cb6d162c06092cefbbf313b890abb050c9be6c9387cb8e8bca7ce64e9f311e901f009593c4c114c73eb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd