Analysis
-
max time kernel
100s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 21:47
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://google.kz/amp/s/starofservice-tv.com/YoS9j/cmVjcnVpdG1lbnRAbWFudWxpZmUuY29t
Resource
win10v2004-20240412-en
General
-
Target
https://google.kz/amp/s/starofservice-tv.com/YoS9j/cmVjcnVpdG1lbnRAbWFudWxpZmUuY29t
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 178 ipapi.co 179 ipapi.co -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133584688655212323" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1316 chrome.exe 1316 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe Token: SeShutdownPrivilege 1316 chrome.exe Token: SeCreatePagefilePrivilege 1316 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe 1316 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2784 1316 chrome.exe 85 PID 1316 wrote to memory of 2784 1316 chrome.exe 85 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 3712 1316 chrome.exe 87 PID 1316 wrote to memory of 2156 1316 chrome.exe 88 PID 1316 wrote to memory of 2156 1316 chrome.exe 88 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89 PID 1316 wrote to memory of 3504 1316 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://google.kz/amp/s/starofservice-tv.com/YoS9j/cmVjcnVpdG1lbnRAbWFudWxpZmUuY29t1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe491aab58,0x7ffe491aab68,0x7ffe491aab782⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1884,i,4738602326025904855,4425078504492451771,131072 /prefetch:22⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1884,i,4738602326025904855,4425078504492451771,131072 /prefetch:82⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2216 --field-trial-handle=1884,i,4738602326025904855,4425078504492451771,131072 /prefetch:82⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3004 --field-trial-handle=1884,i,4738602326025904855,4425078504492451771,131072 /prefetch:12⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1884,i,4738602326025904855,4425078504492451771,131072 /prefetch:12⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4088 --field-trial-handle=1884,i,4738602326025904855,4425078504492451771,131072 /prefetch:12⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3028 --field-trial-handle=1884,i,4738602326025904855,4425078504492451771,131072 /prefetch:12⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 --field-trial-handle=1884,i,4738602326025904855,4425078504492451771,131072 /prefetch:82⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3444 --field-trial-handle=1884,i,4738602326025904855,4425078504492451771,131072 /prefetch:82⤵PID:3456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3416 --field-trial-handle=1884,i,4738602326025904855,4425078504492451771,131072 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3276 --field-trial-handle=1884,i,4738602326025904855,4425078504492451771,131072 /prefetch:12⤵PID:836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3148 --field-trial-handle=1884,i,4738602326025904855,4425078504492451771,131072 /prefetch:12⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3412 --field-trial-handle=1884,i,4738602326025904855,4425078504492451771,131072 /prefetch:82⤵PID:4144
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201KB
MD5f5bc40498b73af1cc23f51ea60130601
SHA144de2c184cf4e0a2b9106756fc860df9ed584666
SHA256c11b6273f0c5f039dfef3bf5d8efe45a2ecf65966e89eeb1a6c2277d712ae9fb
SHA5129c993ef3ec746cbe937bbe32735410257f94ceb6f734d75e401fb78dc2e3ab3b7d83c086086f0e1230dc8dafd5328f9af664341eb781c72e67c4d84d1f6c1112
-
Filesize
384B
MD50e11345590af62759b0f0a17075b29b2
SHA1b2cde54378deb7ec866b0ed3f0e3c2afc9b7beae
SHA256be0cc2f1304066215294cf36c9d3fc17c7f7550e6a24c8cf381eb239c23b5422
SHA512127df865b1d7b3d00a5941259cfb77c8d57062e9a92526a7a15d5107034ff9850c59508643beabb236d5084df9a408f227fe94c7506f5baae82bb913c518e749
-
Filesize
3KB
MD59ebbf7749f7d452f6301279c548abbd3
SHA1f461f364d5ca109bf57305370b4f29f0fe77276a
SHA25617af594bac3ff74137e513b900f193ff95bc852070b95f8adaf6bdf484be7417
SHA512f5244c46f21596eb798d8d4b03a5a20d0360eb673bfeb90e863ae48f8cdd7c3a4f3cc58eb8bbc67fc5e68e7d89141a3f9f76713f4e17ecb378ffb820503ec46f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5036df1147fb5baa33710cf8519af2f4f
SHA12256ce490ae193c39b14a97779a5785149ade27c
SHA25669c84bb3bac82f20ef3ab6b90dd25aa8249ef1f79ad10677dec5a6787975ecaf
SHA5125398b5ac734722086e410d2f564cd65f953e6109843194ece96c601d924f710c513ab9a376360f1663074b5dbc8f4cdee6f83a716c6e25773eb6f3cf5c4a71d1
-
Filesize
6KB
MD5e84efadc72271c4dc0de0d80e89ce357
SHA19d178cb9e6665ef8aaea800ec012dcb9d83e8f4b
SHA2564e7857e8f02c11e2e174487036bdd46a42e27318136519f14d56a6c4dad55a5e
SHA512cfb9776338e1ba2ff1b423060de64fe5b97d75dfb9e1af6a4f55960013a4c93f9d69030ba0bade6f3909577fba43a46a92dfd4968d4ef9ceb8680b3e742a8a5c
-
Filesize
7KB
MD56426fca13fbe39db129cf2b26be82a5f
SHA1e3cef63da1e84eb41408e373fd84d1cf2f3da7b0
SHA25622e7f3d8ba9605d6126f4a9eaa611ad0396d31df23b657a0b61b3c9aee2df2a4
SHA512a969a56491757a0cb29a061a2b8ba6730cdef1f60bd7f000846798e030fd48213101176c87de0c4864e835559f88bc9a9c639f8bc22e608062e7dfaecf3667fc
-
Filesize
127KB
MD50ad16198d0085b05cc3f48a06c0f045e
SHA1caa32c604c337b7cb2bed9ebae597c4c3682e33b
SHA2561c4d60c5085406502ce6f34b364aa0ae3815f100b2c59fe10a9ffe7fa2db5342
SHA512a826a4338506ed26252cf7ef280cdf76413cd1e1503570b716bd11f9f83db7dc7562a6ad1bc391c8b7a2cf46676c45afb8c9da7e145e5c30f5e9ba8ab4fa5148
-
Filesize
91KB
MD5536e7bcf8481a70ccf5731aa6a7ea29e
SHA1c3a77bd4ad6c04c7e645ca479c92d3a412a4c156
SHA2568b191ecad8f22d944e87b0a68e5a0a192b5d0781b0775de2986119ee6aa664ae
SHA51249e9947758d6d708a9c534fdcb7e320fe392e4e8d44637d84e3477bfbc29ff0381a071afc33aae96ed55ec98360ed1eb19ac129e81315662d86e4630f5e34cca
-
Filesize
88KB
MD5d86873b9d9e123afc7811a9dedb4b8c4
SHA187aa135622d396d86553b08af2d901bd66bae51a
SHA2564415c27bef9f07340ddc560cf22f71aefca55bdd53a3db6d55e997e4fd17712d
SHA5120e98da95fba6959748fb5bc9cdccb24ccc88d6e82cc31ae760ce901c5130ab5228302881a5f88d238cdd52abb0d96c4496c97daf984ccb03e714167cebb05352