Resubmissions
16-05-2024 16:39
240516-t6faysdh72 314-05-2024 14:36
240514-ryw8dsbd49 314-05-2024 14:35
240514-rx7yhaba9y 307-05-2024 14:36
240507-rysvzabd3w 503-05-2024 10:51
240503-mx5qxseg99 529-04-2024 18:03
240429-wm3cgsgg97 329-04-2024 16:46
240429-t99c7sfg7z 324-04-2024 18:17
240424-ww3plseg63 323-04-2024 17:19
240423-vvz2naac23 3Analysis
-
max time kernel
1800s -
max time network
1695s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
Elmo.jpg
Resource
win10v2004-20240226-en
General
-
Target
Elmo.jpg
-
Size
5KB
-
MD5
a6564d72511a7a126fca09696f55dda7
-
SHA1
afe5009a79b718a57f7b47295bc2dbaf15f15b6d
-
SHA256
20656fb66b0629c323be0f5a94ccbcdc7ba7fe8d14c6a11f90de18819cfc48b0
-
SHA512
bb484a1c1283676583fa04539b77cf5735e45b60ba13e8911a7da417159475cf2b70f2cad7ef2ea7b65067b715ac1bc9c57f2169659da3831e4c32f58f504b0a
-
SSDEEP
96:nBxQRQwdVJHiRfc3E1yU38aUuurzdm2l492S8VlrRV1TfHUniBTF4Tb42UvMmcUd:BWDCRoE1zUhL492FTVhsn0u2kM
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133559759625638170" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3368 chrome.exe 3368 chrome.exe 5516 chrome.exe 5516 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe Token: SeShutdownPrivilege 3368 chrome.exe Token: SeCreatePagefilePrivilege 3368 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe 3368 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3368 wrote to memory of 3112 3368 chrome.exe 96 PID 3368 wrote to memory of 3112 3368 chrome.exe 96 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 2584 3368 chrome.exe 101 PID 3368 wrote to memory of 828 3368 chrome.exe 102 PID 3368 wrote to memory of 828 3368 chrome.exe 102 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103 PID 3368 wrote to memory of 4980 3368 chrome.exe 103
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Elmo.jpg1⤵PID:760
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff86fde9758,0x7ff86fde9768,0x7ff86fde97782⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:22⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:82⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:82⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3236 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:12⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4712 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:12⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:82⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5224 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:82⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:82⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5232 --field-trial-handle=556,i,17191629931526772096,8424309800532292368,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5516
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3648
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2648
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\28084a6d-1699-4d18-b2a6-1ca141418194.tmp
Filesize1KB
MD5fa1756d6a44a6480745d6b26c7158f11
SHA11937a12eb0785e29c65e11934c583e95623b2c59
SHA256c3ced60fe809ce812b6001634bd4c782d4fd1f79a42232cb11f29d50809d2c09
SHA51232928df46d6324439d133bf61ba4a15980142a1b3dc369a36954267147cbb82681901418cf4eedda321bc23b8037f6559f09ac770aefd7302c2716cc4998c221
-
Filesize
1KB
MD582f6afac5a15857c18c77455ff17f009
SHA1983a5e1847b06b5a51ddbc605b4c5cfb5736a01d
SHA2563bc373d216d35522a98bc070d406b012f9c7ae311b5913c4fbc83a33f5cc11e6
SHA5129268fef9857e3e79cda445074fc0c14a1acfb84b6dee07aed1b251c959e9f2b2ee3ec38f2476493ad549419ba48764b1a0301afecf9db41dad9b4716ecee92c2
-
Filesize
1KB
MD5e1b94950952eb7706f3c65ca2eb7bbc8
SHA13805070b3ced8649e3db587d4ffec554037ad3a7
SHA2567c2f16fa41499234952e77521a2c6f9e689227c95da158f63a9b5589559c65dc
SHA512a2805730408836bfb52f91edc907c552ec27a93ad8aa1140ec690a5c320bed8204356f84b3e8fa987b4873a9cb867a1275a0d45402b72ac7ada4dbc710117304
-
Filesize
371B
MD57d40874471342d0a0501ed6869c623bb
SHA19e8adb18d18ec2f28e944ec7b9bdc1065461a215
SHA25625f5e6215147dca6936f9b6c236ad6697971299cdefe4a8bcdfa697e09018bd6
SHA51280edfb5e3a245016240e70c4eed51dc55463c0e2f84051bc1718b87468ea17c916009b90ba1d97962100e93be589386a6d797be0a467c82a8adb1db939c72256
-
Filesize
6KB
MD5e444ca987b57a52dea97f89279685a2a
SHA13bb85b13e92940f724c13de7972a77d9c6c2a35e
SHA25603ae7c13ae229aabf7c6de601e343e19e2faae0194b53b7588b63669d8631006
SHA512b56fe0e6f01888a81c56aff056518329d90a8ac244eb30563c6a940b2fbd3c18d6560ff76a692494643372864c6af81db41bbb795f59bd8e91a819a2b1120353
-
Filesize
6KB
MD586d671288a00065f6b9c04962b48caab
SHA130b4a15fabfeec115a3cd30c085dcf2c5524d3d4
SHA256de246aaa514c1e15ae7fb9b7ba499515a312899817f3fbea72e5c72a8cb20866
SHA512d11a4bdf5c52ddc21c19941e5e107ed9935929e3a67f71b40cbdd944b60446badb2d5807e242fa6d7154130230837791a5ef665f7ec6d80df1a0ec255af2fa7d
-
Filesize
15KB
MD590042b57c1c2f189e5658da4964475be
SHA18032b9d775ebef3e18f88eb1a09db2830ec43c26
SHA2568b92da013801f395b2b94a3f343c0ed1c9e9f67baaa799ec9a4074a8beaac3db
SHA51299c985051b9516aca61e29f7bb1c54b2afb3a36b248ee3d35facc3a9a2e777af8e2da7f58f9b03b6afc63a4f12ec4e63ac672c13b15ff7a7f6caf7587488cc2f
-
Filesize
258KB
MD57a2bc8cecba7c2dd4e4582637c665d14
SHA115cf8546b1af70f7b6d1c1501f684d5ed1eb7d31
SHA2560b37223d1735faf23544b0e8e02a1c8b283da01bbb35e0b6c1915ffbebf6742e
SHA51228a0bda88672776a5be717368e78f8e042773eb5d48302efc5cf7fcac7b426169d4dc1d816e86db633c6f6ca4e8e7711d74eddc972d7fcf1a9ca2d420078b234
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd