Resubmissions
14-05-2024 15:54
240514-tcahlsdd3w 414-05-2024 15:52
240514-ta6s2adc6z 414-05-2024 13:49
240514-q44nzsaa25 1Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
14-05-2024 15:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://url2.mailanyone.net/scanner?m=1s3sYM-0001Pe-5a&d=4%7Cmail%2F90%2F1714979400%2F1s3sYM-0001Pe-5a%7Cin2e%7C57e1b682%7C28613012%7C14303582%7C66388352155AF842D2052C0EAB0E6D77&o=%2Fphts%3A%2Fatsassemus.t-mdktcnai.ybos.5%2F67cm08ee-fd3f-81ef-9f51-6200380e24td3flgia%2Fiseasas%2Ftstflndrneoao64msa514%2Fae4e-19-f500f1-09-0989fa803a3d&s=niHqF-FnSdLE77aGZUN4Ee9fyIM
Resource
win11-20240426-en
Behavioral task
behavioral2
Sample
https://url2.mailanyone.net/scanner?m=1s3sYM-0001Pe-5a&d=4%7Cmail%2F90%2F1714979400%2F1s3sYM-0001Pe-5a%7Cin2e%7C57e1b682%7C28613012%7C14303582%7C66388352155AF842D2052C0EAB0E6D77&o=%2Fphts%3A%2Fatsassemus.t-mdktcnai.ybos.5%2F67cm08ee-fd3f-81ef-9f51-6200380e24td3flgia%2Fiseasas%2Ftstflndrneoao64msa514%2Fae4e-19-f500f1-09-0989fa803a3d&s=niHqF-FnSdLE77aGZUN4Ee9fyIM
Resource
macos-20240410-en
General
-
Target
https://url2.mailanyone.net/scanner?m=1s3sYM-0001Pe-5a&d=4%7Cmail%2F90%2F1714979400%2F1s3sYM-0001Pe-5a%7Cin2e%7C57e1b682%7C28613012%7C14303582%7C66388352155AF842D2052C0EAB0E6D77&o=%2Fphts%3A%2Fatsassemus.t-mdktcnai.ybos.5%2F67cm08ee-fd3f-81ef-9f51-6200380e24td3flgia%2Fiseasas%2Ftstflndrneoao64msa514%2Fae4e-19-f500f1-09-0989fa803a3d&s=niHqF-FnSdLE77aGZUN4Ee9fyIM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133601755539205742" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3062789476-783164490-2318012559-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3860 chrome.exe 3860 chrome.exe 4412 chrome.exe 4412 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe Token: SeShutdownPrivilege 3860 chrome.exe Token: SeCreatePagefilePrivilege 3860 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe 3860 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3388 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3860 wrote to memory of 232 3860 chrome.exe 80 PID 3860 wrote to memory of 232 3860 chrome.exe 80 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 1800 3860 chrome.exe 82 PID 3860 wrote to memory of 3960 3860 chrome.exe 83 PID 3860 wrote to memory of 3960 3860 chrome.exe 83 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84 PID 3860 wrote to memory of 984 3860 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://url2.mailanyone.net/scanner?m=1s3sYM-0001Pe-5a&d=4%7Cmail%2F90%2F1714979400%2F1s3sYM-0001Pe-5a%7Cin2e%7C57e1b682%7C28613012%7C14303582%7C66388352155AF842D2052C0EAB0E6D77&o=%2Fphts%3A%2Fatsassemus.t-mdktcnai.ybos.5%2F67cm08ee-fd3f-81ef-9f51-6200380e24td3flgia%2Fiseasas%2Ftstflndrneoao64msa514%2Fae4e-19-f500f1-09-0989fa803a3d&s=niHqF-FnSdLE77aGZUN4Ee9fyIM1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcfa3aab58,0x7ffcfa3aab68,0x7ffcfa3aab782⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1496 --field-trial-handle=1808,i,9297593375800256017,15441094266998241220,131072 /prefetch:22⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1808,i,9297593375800256017,15441094266998241220,131072 /prefetch:82⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2164 --field-trial-handle=1808,i,9297593375800256017,15441094266998241220,131072 /prefetch:82⤵PID:984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1808,i,9297593375800256017,15441094266998241220,131072 /prefetch:12⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3168 --field-trial-handle=1808,i,9297593375800256017,15441094266998241220,131072 /prefetch:12⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4348 --field-trial-handle=1808,i,9297593375800256017,15441094266998241220,131072 /prefetch:82⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4512 --field-trial-handle=1808,i,9297593375800256017,15441094266998241220,131072 /prefetch:82⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3756 --field-trial-handle=1808,i,9297593375800256017,15441094266998241220,131072 /prefetch:12⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2352 --field-trial-handle=1808,i,9297593375800256017,15441094266998241220,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4412
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3564
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD55925d27d6a43bbebc5c34769c1c8510c
SHA1abcc51839e620f6696f9b416ffffd6af5dba7a66
SHA2565d13160cdb79bd2c204096ab20cf3700d3de2adb5e270bb9f8002fed83afcb17
SHA512bd16010cde856c2dd7044094c675013c941c70b39cb9af17cbfe727f16817f94e612320dae55678237071b6b81164b577cb2645e9c778c80abab43fef79b5770
-
Filesize
2KB
MD543a15c294af9b1f9d99d20783dd11724
SHA1b0ddb573be37fe994f014e451519436cade89770
SHA2568afe3ca23762cb159e4c1ed7d5b0c878021e28d30ea6cbee414a88338f58b7fa
SHA5122f8c915820c8f25b85606c255b3a35c7b10334cae399dfeded0099e2dd37149794808bb3fb6538c09cc5eeeea5bb6f973d92de36053ba8add58552390f5cd9df
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD5c1eb80c8d5b2131b0cb343e3039c5edb
SHA10c4942df464a5d35f089dfe785e2b5157498a044
SHA2563f1280d0cd5a1d3219c5818f202b02d5445f5cfc8f43b36b9e6e932080e48a69
SHA5125c5214e183b2ad8cccddd80af0f19fc2dfd608be471ad1c188027b8a68318d5afee0f4f3699c65b3977af102ac65e0965136acb5b1a1b712b34d893fba97e823
-
Filesize
7KB
MD532c8fed4f9815bbc53f0d0811c03559c
SHA16b05e7b9360c6119444ff89bb48e94a7c297bf99
SHA256a54c2a99251e3b7a070b2ba5aad62a5dc74e0c0efbc49b0cf246dca8e8ccb5ff
SHA512b1326e698b35bad112b235ebd7d37a72bba0b2e57356bea49993ac33123ee0ea592af47d6be81e758d65b8671c66f8be5b3e65625595d09a6a6927f17fdbe068
-
Filesize
130KB
MD5a0f607e2b73243e7116a64a8adf6e37d
SHA1e8e54d708069a2c4f400e555f0afae73fca8ae30
SHA2564cba1918a677ef5aad666b783cfa853108d2405f25dd3b412ee4451c875ad56d
SHA512477d4b6b649a37854b6271999e8b5a4733c4c33f2bf83f35562bd7d2a79392b7943e293345b6ffb9fc43d7314614add582c88771b6ca1770b19b64e05a186d98
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD52cb9e3f89741961748d38d15dfecc8fb
SHA111f89dfac73dfacb194fa01bf6e7fddb38c1f6d7
SHA256e76dcf1390543fde2ae6fd8263e90df10923df9dfe78a5fb588a50654577fd13
SHA51220557311d13320d2f7c8bfb99e49c8af30dbcbace0faaa5101f9ea893a017a55100bf2b3c466c9d9cfe4fa8a8affcef9223a870abbcf571492fa90abd0e748f2