Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 14:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cSlMf04.na1.hs-sales-engage.com/Ctc/DM+23284/cSlMf04/Jks2-6qcW69sMD-6lZ3l7W5_G68w6c8_klW82xVC73lHqH1W99XQWH1yf9vWW7NN3mq4GMr0cW3CC37S1wCGkZW9lnLhW3ykcksW6fsDl-5zbX04N47WD5nZlKCYW50DKMp6lLtsJMdk8fK866SHW7nwzJj3LhWfvW7PWQbp2WB1wPW7jXj0N6mvHMvW2sLFkN38DzVjW372Vp_6cdNlQW838z4q6lcg62W94nhjF3Q1JJJW2XdsvG2M8BP1N9dlqMrVfHK0N4sKT2RFlG3Rf8yxPQq04
Resource
win10v2004-20240226-en
General
-
Target
https://cSlMf04.na1.hs-sales-engage.com/Ctc/DM+23284/cSlMf04/Jks2-6qcW69sMD-6lZ3l7W5_G68w6c8_klW82xVC73lHqH1W99XQWH1yf9vWW7NN3mq4GMr0cW3CC37S1wCGkZW9lnLhW3ykcksW6fsDl-5zbX04N47WD5nZlKCYW50DKMp6lLtsJMdk8fK866SHW7nwzJj3LhWfvW7PWQbp2WB1wPW7jXj0N6mvHMvW2sLFkN38DzVjW372Vp_6cdNlQW838z4q6lcg62W94nhjF3Q1JJJW2XdsvG2M8BP1N9dlqMrVfHK0N4sKT2RFlG3Rf8yxPQq04
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 131 api.ipify.org 136 api.ipify.org -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133559385435555462" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3848 chrome.exe 3848 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3192 3016 chrome.exe 91 PID 3016 wrote to memory of 3192 3016 chrome.exe 91 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 4580 3016 chrome.exe 94 PID 3016 wrote to memory of 2660 3016 chrome.exe 95 PID 3016 wrote to memory of 2660 3016 chrome.exe 95 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96 PID 3016 wrote to memory of 3340 3016 chrome.exe 96
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cSlMf04.na1.hs-sales-engage.com/Ctc/DM+23284/cSlMf04/Jks2-6qcW69sMD-6lZ3l7W5_G68w6c8_klW82xVC73lHqH1W99XQWH1yf9vWW7NN3mq4GMr0cW3CC37S1wCGkZW9lnLhW3ykcksW6fsDl-5zbX04N47WD5nZlKCYW50DKMp6lLtsJMdk8fK866SHW7nwzJj3LhWfvW7PWQbp2WB1wPW7jXj0N6mvHMvW2sLFkN38DzVjW372Vp_6cdNlQW838z4q6lcg62W94nhjF3Q1JJJW2XdsvG2M8BP1N9dlqMrVfHK0N4sKT2RFlG3Rf8yxPQq041⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa8a09758,0x7fffa8a09768,0x7fffa8a097782⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1844,i,10473760419430840326,13237902935145787834,131072 /prefetch:22⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1844,i,10473760419430840326,13237902935145787834,131072 /prefetch:82⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1844,i,10473760419430840326,13237902935145787834,131072 /prefetch:82⤵PID:3340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1844,i,10473760419430840326,13237902935145787834,131072 /prefetch:12⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1844,i,10473760419430840326,13237902935145787834,131072 /prefetch:12⤵PID:592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4912 --field-trial-handle=1844,i,10473760419430840326,13237902935145787834,131072 /prefetch:12⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4892 --field-trial-handle=1844,i,10473760419430840326,13237902935145787834,131072 /prefetch:12⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1592 --field-trial-handle=1844,i,10473760419430840326,13237902935145787834,131072 /prefetch:82⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 --field-trial-handle=1844,i,10473760419430840326,13237902935145787834,131072 /prefetch:82⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4720 --field-trial-handle=1844,i,10473760419430840326,13237902935145787834,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672B
MD59307e0d2c01b06e2178951679f728433
SHA1fdf4d4f93f0fae74bcdb644aa3db3e656a693d9c
SHA25639e2f80436900ac50696a5439042f5bd5239130b6c6be38016bde7f149c8729a
SHA512c2abf7eadee674230365812e13122658b43e23f0dc1f07d94f295ca0f3e64ccc260333af1228ed95c5327bd95f084a8ebf18271da8d8b287941936edf488ff29
-
Filesize
4KB
MD5a22b3302ea5f53b373e5537a1c549e2a
SHA15c186a85bc972fbb856003bd5572c08caa534e2d
SHA2561799deb0927d0edbaa81033ae2167fc16cf0f3cbb5c81b0e47615af47209b143
SHA512d8ba493f60f120b0043e1fcb71e3685112a7561c43a733c8bd218cb9cd689079f1acc9ce3358237c814de98b33f24d1d99494b97b258e88b9d28742c3698a3ef
-
Filesize
1KB
MD53bd539ece8d839f926aa418bf7de4ee6
SHA1f9d4e968a182632568660acf08ef6df9657b4613
SHA2564aa7b06f9ec669a5665f687c4b579693799e2f78b37810c670342c7275071511
SHA512de0d0c6cc7bfcae8be40bb8ff7b38c7bce05f7259ab5c5099266c90733a6be41a0debb4676d179fff96fb052a2268ddb832fc782da5bbde9f4cdc6e67ba8193a
-
Filesize
1KB
MD5b73ca756fefb71c392f89490f5fe554f
SHA1f92b3200ebcf8bb006e49e91b00e892de65a73d3
SHA25620df0482133c97c890abbbe886617430191b92b345ee22d24290715adaa483d6
SHA512d8a79e260abc2d552b9e1077281f208d3e453fc47baea377f8e43cda14c2de81cf7a4e7b1d4f44899aef5a79cf4b260eb182a1a596a3e5bd7ea366a4ad1280ed
-
Filesize
1KB
MD51443730ccfa478ca753e89d0d9a5adb7
SHA1b65dd3d7c4f232c726061805f3a2918ce5abfc7c
SHA2563b0415248f7de62bf2301fde405ee16a994d8d18497e97d0eadbc7691b72f763
SHA5120d128fff5dede03f4b34703935c629d1dadc5892c2767af6380215f987b065f01aaf5f5159b22da0bb513113fc9b7b6d466e110d84fa1fb516e1107b42cc464c
-
Filesize
6KB
MD50601bc1bb94c3fb4f09c05715b9e5001
SHA1d49e704adfbc6be66e4259a3b5d599fb79b43c33
SHA256c137f961efbdb750b02060b6e43d37cd018954a96d091fe287be00412fe7cea6
SHA512ecbf2b632c644d149676fc3ccb4b757c8451522f15cf556fe46967e60ea9948adf997259069bfd1a05b4c58290f8d63d56b68c81404eaf509481394a84db3720
-
Filesize
128KB
MD5a24b756fbedd0f064b8b1b3d58fc429d
SHA1eaa94c26254500c663bee8545da3bd23701cc275
SHA2564bde7fb85b32b4e45bfecc39456f92b916ff19d0b87a392b0c991bed9a762cac
SHA512abc6310bd8fd30d27c819d32f8fa5baa52cd54a759e07b5f70ba4e12a6c277c70d193672454a38fbaf07623eb0b4af6934a9e5bee94010f398fcb13ff212768e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd