Overview
overview
7Static
static
3PlayGames_1.1.5.exe
windows10-1703-x64
7$PLUGINSDI...er.dll
windows10-1703-x64
1$PLUGINSDI...ls.dll
windows10-1703-x64
3$PLUGINSDI...em.dll
windows10-1703-x64
3LICENSES.c...m.html
windows10-1703-x64
1d3dcompiler_47.dll
windows10-1703-x64
1felipe.exe
windows10-1703-x64
7ffmpeg.dll
windows10-1703-x64
1libEGL.dll
windows10-1703-x64
1libGLESv2.dll
windows10-1703-x64
1locales/af.ps1
windows10-1703-x64
3locales/uk.ps1
windows10-1703-x64
3resources/elevate.exe
windows10-1703-x64
1vk_swiftshader.dll
windows10-1703-x64
1vulkan-1.dll
windows10-1703-x64
1$PLUGINSDI...ec.dll
windows10-1703-x64
3$PLUGINSDI...ss.dll
windows10-1703-x64
3$PLUGINSDI...7z.dll
windows10-1703-x64
3$R0/Uninst...pe.exe
windows10-1703-x64
7$PLUGINSDI...ls.dll
windows10-1703-x64
3$PLUGINSDI...em.dll
windows10-1703-x64
3$PLUGINSDIR/UAC.dll
windows10-1703-x64
3$PLUGINSDI...ll.dll
windows10-1703-x64
3$PLUGINSDI...ec.dll
windows10-1703-x64
3$PLUGINSDI...ss.dll
windows10-1703-x64
3Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
16-05-2024 17:46
Static task
static1
Behavioral task
behavioral1
Sample
PlayGames_1.1.5.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
LICENSES.chromium.html
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
d3dcompiler_47.dll
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
felipe.exe
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
ffmpeg.dll
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
libEGL.dll
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
libGLESv2.dll
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
locales/af.ps1
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
locales/uk.ps1
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
resources/elevate.exe
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
vk_swiftshader.dll
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
vulkan-1.dll
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
$R0/Uninstall felipe.exe
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/UAC.dll
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10-20240404-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10-20240404-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10-20240404-en
General
-
Target
LICENSES.chromium.html
-
Size
7.9MB
-
MD5
312446edf757f7e92aad311f625cef2a
-
SHA1
91102d30d5abcfa7b6ec732e3682fb9c77279ba3
-
SHA256
c2656201ac86438d062673771e33e44d6d5e97670c3160e0de1cb0bd5fbbae9b
-
SHA512
dce01f2448a49a0e6f08bbde6570f76a87dcc81179bb51d5e2642ad033ee81ae3996800363826a65485ab79085572bbace51409ae7102ed1a12df65018676333
-
SSDEEP
24576:dbTy6TU675kfWScRQfJw91SmfJB6i6e6R626X8HHdE/pG6:tygpj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133603557107150736" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4108 chrome.exe 4108 chrome.exe 3564 chrome.exe 3564 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4108 chrome.exe 4108 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe Token: SeShutdownPrivilege 4108 chrome.exe Token: SeCreatePagefilePrivilege 4108 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe 4108 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4108 wrote to memory of 3340 4108 chrome.exe 74 PID 4108 wrote to memory of 3340 4108 chrome.exe 74 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 784 4108 chrome.exe 76 PID 4108 wrote to memory of 2356 4108 chrome.exe 77 PID 4108 wrote to memory of 2356 4108 chrome.exe 77 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78 PID 4108 wrote to memory of 1312 4108 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8a60e9758,0x7ff8a60e9768,0x7ff8a60e97782⤵PID:3340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1504 --field-trial-handle=1812,i,7435923056195349610,258816523265372431,131072 /prefetch:22⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1796 --field-trial-handle=1812,i,7435923056195349610,258816523265372431,131072 /prefetch:82⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 --field-trial-handle=1812,i,7435923056195349610,258816523265372431,131072 /prefetch:82⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1812,i,7435923056195349610,258816523265372431,131072 /prefetch:12⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1812,i,7435923056195349610,258816523265372431,131072 /prefetch:12⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4460 --field-trial-handle=1812,i,7435923056195349610,258816523265372431,131072 /prefetch:82⤵PID:1208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3836 --field-trial-handle=1812,i,7435923056195349610,258816523265372431,131072 /prefetch:82⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3576 --field-trial-handle=1812,i,7435923056195349610,258816523265372431,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3564
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5fb7fe0b13cb9fbd50f37bce1c6093c41
SHA11a2b183a04e829ff4369cf00756eece8589d14e5
SHA25687531342ff5e696b2f55d3edddada240743e4b5d2c0e1f4a03c790d95b200ea5
SHA512616078c858d9c1fbf8561879dc5728ec979f3e606a36fdc1fdaf322c8f7a25481ad5f464acce54d9ac599996d40bd0f6b030ccbeaa7478b76890cddb0da4b1a9
-
Filesize
5KB
MD50449eb0c0cd29ff517d9018479961d0d
SHA1fb79251313c44dbb716587044fb4ef7ec75b766b
SHA2561824c8303ecce38dd91696c93b8d35e3c7792abf40fb51db56319d8000fa069b
SHA5129646cd24ec2198790e42bc71f8cc8168315fd5fbae5e3d8332262348f5e5f071bd77c69593b82b2cb053abb7485b451b69112a3bf51c78610408c36e71a925ed
-
Filesize
5KB
MD524126bc80838c2f6c1a2fd468328b9b8
SHA1fc2e889f827f6f919455f1c6b4131522b04e4ce2
SHA2566732cc1cd3106b2ee4304f63875a91d5c391a224d16f85ded839574dbeebf5ed
SHA5128943459e54435393154a1ef94e7814de5c880c8e5edae1d095482af093f0f50094eac69e4d9207f9b8b3fa8375f614101811c905071167c83be86af3f75235bf
-
Filesize
136KB
MD5da1bb9924fa02840ab38af50192f5b20
SHA1a3bd449c045bc1341df1126f8a3426c3651aba7d
SHA256283db33cdce26969c928cc9e0833438f777ac708fee002ddbfe7811791c81b06
SHA512e119426272c2cd0a6ec86963d1451adc095c2d8d8e3caedf14ba0e3fd6b0019953b618c98b513ab26551a439b064bee92e08aa890f6d5cbf89dbc8e9a2c06017
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd