Analysis
-
max time kernel
299s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
05-04-2024 22:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.absoluteestimating.com/xmlrpc.php
Resource
win10v2004-20240319-en
General
-
Target
https://www.absoluteestimating.com/xmlrpc.php
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133568311239671103" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 3336 chrome.exe 3336 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2892 chrome.exe 2892 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeCreatePagefilePrivilege 2892 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe 2892 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2892 wrote to memory of 3784 2892 chrome.exe 94 PID 2892 wrote to memory of 3784 2892 chrome.exe 94 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 456 2892 chrome.exe 98 PID 2892 wrote to memory of 1636 2892 chrome.exe 99 PID 2892 wrote to memory of 1636 2892 chrome.exe 99 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100 PID 2892 wrote to memory of 1880 2892 chrome.exe 100
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.absoluteestimating.com/xmlrpc.php1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed3809758,0x7ffed3809768,0x7ffed38097782⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1716,i,876698507434297915,3602057573235499546,131072 /prefetch:22⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1716,i,876698507434297915,3602057573235499546,131072 /prefetch:82⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1716,i,876698507434297915,3602057573235499546,131072 /prefetch:82⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1716,i,876698507434297915,3602057573235499546,131072 /prefetch:12⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1716,i,876698507434297915,3602057573235499546,131072 /prefetch:12⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 --field-trial-handle=1716,i,876698507434297915,3602057573235499546,131072 /prefetch:82⤵PID:5264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1716,i,876698507434297915,3602057573235499546,131072 /prefetch:82⤵PID:5404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 --field-trial-handle=1716,i,876698507434297915,3602057573235499546,131072 /prefetch:82⤵PID:6068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1716,i,876698507434297915,3602057573235499546,131072 /prefetch:82⤵PID:6076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3980 --field-trial-handle=1716,i,876698507434297915,3602057573235499546,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3336
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3444
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3776 --field-trial-handle=2232,i,9772508353233483703,11473701862007458502,262144 --variations-seed-version /prefetch:81⤵PID:1064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD56f33b17a0d6323ade558bd51a4a64fe3
SHA1b700a9763549e3b3ddc7962faaa8ecb73f24876f
SHA256b9d2bdde78f1a864696770efa650555762f002a16d609907042f78b21d9e60cb
SHA512e2b6ce5f49f39fec707b3d88d4b0f1f46a05e79c2e374ec946dcdd28174781bbfccc9d8f6d9909c22c59d66c94dd70a5e4938f76daf2f186d86be663e2894445
-
Filesize
1KB
MD5dab2b0fd3895e3b4809ee6918ecd6040
SHA1a06c7e5a2fca001fdcb10b4bf99a49eeaad3a148
SHA25682da77d45ec1c01cde286ee4ab1a3104ef80a7d64014445f7952923e649d35b0
SHA5120b6369c9183b6a2b1216899dee36db76800b988ee47322d18267e7021209664acde29e2120b7957baccd5afefb0e23ffa602f6261b09f6765304d9c36b9f1523
-
Filesize
1KB
MD5d1d19068e8cf1a67ba122a6004d7780d
SHA10816cbec146d3df575d7685c03b4ac3be2c739d1
SHA25601afd3a47b6b798cd79e4082c8fd9c0a1b2d3a6b2f3ddecae8b26bc6fc593209
SHA51203ea9e6a092c18298111579499679e0593641846e73f4fede65b8bebe4b77492a7ef4bf503c50b971bc7f92bf7f8a637969946444d6e574bc613b0764e90644a
-
Filesize
1KB
MD5e58fa150fd0b2fffa38fb4625ed4402e
SHA1cc320934dd77ce930cb5f6af4f3eab271455abfe
SHA25657966630018e65079c01c8a55f75939b37b370e401ab98663cd004503bbfeb6f
SHA51235c2cc432b6e7157412e3fb7295a833a46581e680906d4239f8e64b563fa6d41b0085a7bad4a94d6fcf298261eb2ebc61e6d5cdb9d8bdb86ec8e9c01cebfebd9
-
Filesize
1KB
MD5d37f31d0adf730868540a3a611be40a7
SHA128dbe01eedf890018831d4ecb2f42a79843adcfb
SHA25695b7cd238d43ad31f56e3d2db8c8c67f1994c777783bba238a04fa186401f8c1
SHA51208ab3c9c60f27ca89204b71511d7f1b7fcbde3e90bc6bf110a318530497ce1954a9a4c70065b53c83eb4d5fc4e1c7cbea113bfc3ebd099d3942001fb7dab3571
-
Filesize
539B
MD5e05f6c53d323c9f47a3da85bd440082d
SHA10ca7922ede2e4a3f972da5b09a441562580690aa
SHA25686eee7c34dad49c612018f4580b20c69780df76af07c497810b7bf8de55258b1
SHA5120a1d55e1757cbf0531a29f57e23afbdf0bb360eee6be3fd679e71cb879d1ee321b6ba3b43e3e61a9394eff3ddef298d6bc67f00f76016e03574d2455638bf36c
-
Filesize
6KB
MD52efb13f7f6545299774796522e9b565d
SHA14875242de1c885f50d1690b1250476aaddb46997
SHA256e53cb191f757e59a2693956066d13d404dd111f56c5e5f28374aafabe484e3bf
SHA51218e48e556504117608022d1e7a2154fa1efb37b6f17265c16a0b4314f6738159ce19915a8ce3adf6effe74979f2f3f0d2d8e85a9c514056feb92614ec20329ab
-
Filesize
6KB
MD595f9d309dc0be25e85eaeca9f4305f76
SHA162bd31d710ddd65a7298a3710693335fa3952e86
SHA25685dd7a582d0e71a84f4e081fd94c103c699243aa21843892ce1399d857e84df2
SHA51204671b64fa62b95a9b209e4f53bd0051af70a12a396afe356bd4bfeba79095e598033e6b2d577284c4ec22eb498c49d5117716e02fdf8ee7af1161098633bcb4
-
Filesize
136KB
MD54a8e8081eadd9d541d72314e50595cfc
SHA1cf46b10ba7b177782b89dc1995a9627796b33197
SHA256710f677ae7ea68676677b6fd37dbedf87d407aebe8ee07112013b089e5cb2733
SHA5124af67ad2ee36a4f0770ac3537931c653a563c46327b004bf2b96b652b6b2f0d75f033267d918f82ec1bfb588d9a11a7e24bb47ec282322c7ad0f571f81992850
-
Filesize
136KB
MD5accaef3ae7dddba0216a93d932e80491
SHA105108541342ac0bfb67c75b679ff88e846dd9281
SHA2562baacd4285fbd0b8cc5008775fea386f6dea9d014094bed6d13725d93770274d
SHA51214eef52b67d4b33cdcc072bc7a59539cde6ad32fac9caa04a0bc3d18264389279ea5ca33c341d215c03989d65cd1aa966862ad371ca9c04e47dcc3aff1370f0b
-
Filesize
136KB
MD5c640e0c9939fdec488b1dd6612180dcf
SHA12873020fbb35e05bd4700dd75b94ad0cbe4e9439
SHA256b91a626d01afd1b0a133c5fb1837bfd4229881439f1d6f3f61c1f2b2f05adb2e
SHA512701a948736a38f6f635f33717c429abb9caec782d683dce378a92ebd16420be1ae6ac5a148c141d398d1507253473f57e6ad61b6cfa32416bd37f00b1814da5c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd