Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1199s -
max time network
1091s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
26/04/2024, 10:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bp.sftwr.ru/
Resource
win10-20240404-en
General
-
Target
http://bp.sftwr.ru/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133586023808610660" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4324 chrome.exe 4324 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4324 wrote to memory of 2952 4324 chrome.exe 72 PID 4324 wrote to memory of 2952 4324 chrome.exe 72 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4784 4324 chrome.exe 74 PID 4324 wrote to memory of 4704 4324 chrome.exe 75 PID 4324 wrote to memory of 4704 4324 chrome.exe 75 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76 PID 4324 wrote to memory of 4736 4324 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://bp.sftwr.ru/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffcd579758,0x7fffcd579768,0x7fffcd5797782⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1524 --field-trial-handle=1844,i,6626626275172345622,17041194445133575976,131072 /prefetch:22⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1764 --field-trial-handle=1844,i,6626626275172345622,17041194445133575976,131072 /prefetch:82⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 --field-trial-handle=1844,i,6626626275172345622,17041194445133575976,131072 /prefetch:82⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2616 --field-trial-handle=1844,i,6626626275172345622,17041194445133575976,131072 /prefetch:12⤵PID:1308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2624 --field-trial-handle=1844,i,6626626275172345622,17041194445133575976,131072 /prefetch:12⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4104 --field-trial-handle=1844,i,6626626275172345622,17041194445133575976,131072 /prefetch:82⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4224 --field-trial-handle=1844,i,6626626275172345622,17041194445133575976,131072 /prefetch:82⤵PID:1284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4108 --field-trial-handle=1844,i,6626626275172345622,17041194445133575976,131072 /prefetch:12⤵PID:3456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3848 --field-trial-handle=1844,i,6626626275172345622,17041194445133575976,131072 /prefetch:12⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4344 --field-trial-handle=1844,i,6626626275172345622,17041194445133575976,131072 /prefetch:12⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3036 --field-trial-handle=1844,i,6626626275172345622,17041194445133575976,131072 /prefetch:12⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3116 --field-trial-handle=1844,i,6626626275172345622,17041194445133575976,131072 /prefetch:12⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=924 --field-trial-handle=1844,i,6626626275172345622,17041194445133575976,131072 /prefetch:12⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3272 --field-trial-handle=1844,i,6626626275172345622,17041194445133575976,131072 /prefetch:22⤵PID:3080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=812 --field-trial-handle=1844,i,6626626275172345622,17041194445133575976,131072 /prefetch:12⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=1820 --field-trial-handle=1844,i,6626626275172345622,17041194445133575976,131072 /prefetch:12⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4032 --field-trial-handle=1844,i,6626626275172345622,17041194445133575976,131072 /prefetch:12⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5de36d63ed349a31be761f76d037b3494
SHA197926e24e8a82f46d67552badf918682fbca58fc
SHA25622ae735cd1f99cc0cccb9f345a7673340f74f71ecf3f1201f4bbadd83d1dd196
SHA512f637b3b962cf934596dfeecd0ed4efad0e63ad33902984e813b38ac45a7ac95ebedf356c8960db415c19e6f885d13d147b9bcd43647a9e8706d10daf08b3ebb5
-
Filesize
5KB
MD5747354834536d69d0a43f6ccf6bf3f2d
SHA17f9286bae9eeb553fb8f68bb32c19aa9a5160cc6
SHA256fdfe214f346ae31f0c1e61bb71587a2afa1da198e8a2558f3f06d26ca6326b8e
SHA5124106a642186efad5a617d6051ff3416f76940ab233e2841c5a46ef975a82b163d5fc5dca2bd18fd4e86589b716da3a8c2dad5f498c1c1a7ffbcea49a522e3dc9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\d9ec93af-0fc7-4e52-b63a-b501169f5429.tmp
Filesize5KB
MD5a75e6affff93b063448a19f0e6652d22
SHA13df7dfcd2f83ff6a39e9946e547a0baf9c75759d
SHA256770e5deadecb5a8044f85eca3780eceb71ecd18cc207df7cf34015a8ed793b6e
SHA5122797ac3ebbf9e8dc7b30ffadd18fc88b1937ec7a1864556e81ce4d5836208419798b30c738d921c619b327f0976f5b68ed633728a11976ddae7e94103f211a7c
-
Filesize
136KB
MD5d57f1a9872146c064787b3211a2cca55
SHA199b6e9e8822de954163da748aebd25bee58e0b88
SHA256e611f731b9ef3492ebaee52dc27364e6bdd31e3c553c14371a117d44d4e79037
SHA5122e6d8707f901d6291fd90fc8b148c9426fe4c189496146bbfea9d9b45b3818581ea99dcfe22ce3109ec27e0880af5ef33860380ab7e1cd7457b93279e75c2ba1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd