Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-11-2024 11:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://smartbilll.com/
Resource
win11-20241007-en
General
-
Target
https://smartbilll.com/
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133766630377001475" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4536 chrome.exe 4536 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe 1848 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4536 chrome.exe 4536 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe Token: SeShutdownPrivilege 4536 chrome.exe Token: SeCreatePagefilePrivilege 4536 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe 4536 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4536 wrote to memory of 4924 4536 chrome.exe 78 PID 4536 wrote to memory of 4924 4536 chrome.exe 78 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1776 4536 chrome.exe 79 PID 4536 wrote to memory of 1300 4536 chrome.exe 80 PID 4536 wrote to memory of 1300 4536 chrome.exe 80 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81 PID 4536 wrote to memory of 3616 4536 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://smartbilll.com/1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd3662cc40,0x7ffd3662cc4c,0x7ffd3662cc582⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1820,i,16435613818545766817,982716024719645346,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1816 /prefetch:22⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1988,i,16435613818545766817,982716024719645346,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2296 /prefetch:32⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2056,i,16435613818545766817,982716024719645346,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2432 /prefetch:82⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,16435613818545766817,982716024719645346,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3056,i,16435613818545766817,982716024719645346,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4556,i,16435613818545766817,982716024719645346,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3500 /prefetch:82⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4728,i,16435613818545766817,982716024719645346,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD5337267fecbb8619b6578cec67e21bb35
SHA1f2d8a35db8999460bd99b20c922fa3700b7e1223
SHA25608bc789d41cb01d19e9bb5a3556f6cddab90373efbe715d79a69f510604d1051
SHA51249800c58410c79587c45883d32651ca37467d8548f49a327a32747e6973bdbb0a4aaee2d9d22ffd16ef70fba47a96d8a3cdcdb5c6a0421c014e547205ee423be
-
Filesize
1KB
MD54d65d8c23c1e6e600c2d95d1cb341d6d
SHA1eef56241cb2a4d3fa5a435477a3927530052ee2c
SHA256450db5b2afcf715752d7604009e1464f2a8371fcedd65c1179b446cbf02d00e5
SHA512afb941d112e9b1f64a0f68a402a40df8c0e10f835b8e6beb89b4eaff5ccbf436ead8866702a4524d89b5f9a6953d8b62a051e6833664739bebf7c0887d69dba7
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5c7f42099648914245bdda60afe67aa6d
SHA10fd67b0ae3747ac5c03e1a44c8bbd39e6b3c8a95
SHA2564ecab1809f82130b0ed1fdb426a08354d6c7d7629b4a019f810ac1f788a9f779
SHA512a4e35193bd9f81cccacff14f06d6001ec512d5db40d7822ddf3419a8c440204982892c1f2fe3be6d61d0d03cd3e41d9e78ba78d340cf080ea1cdad3cd4aa9ca9
-
Filesize
9KB
MD5b6b5f345ea8b9eb2a61c2c73f35c5a37
SHA15b7bd34fb6839d3b85b11e796a42c1c814d04820
SHA256561468644764be05d575884c9e62232ddae52eb5678a1359dff28aecc99b2286
SHA5122b8daf3271b48663effec6f217504daf7fd7ee533b5fb8a25a03ed1b505a0bd37b7efc9ba436cdbac9405416a5dca7f05c636eb7d5559560c73f9c5564977bd8
-
Filesize
9KB
MD58842fc490933842590c2f3742dd5fb81
SHA1aad7f59df6267d10e84e3a650644de39877d3d8d
SHA256ba4c0bac9b0d89f2f60f934f767892f38c739ac6b3f83f106c8d8ec7ba20af1e
SHA512ad1f4d0cb220ee16f24a7657fde2193921653b80f99ca9f167ce6036ff65258b97718a75086b4d7c1f2844384fb1688e61d8dc06f44b00eaada6ed97ebba57b2
-
Filesize
9KB
MD51aadbc44695d320dad2cf4eb2d446cfc
SHA1278c6ab212be983d95fbd3f5d768f17a91a9dea2
SHA2561c1aa196101fc8f6d6403e521f7b101658c2c79ac3a191b1d4bff8d60e77013f
SHA51201f4b377d3bfabadad3cf387a59aa44f9dbc9d665bb0d16a8ad360f08c608fab981cabf3e847332bc44b6438ec76dc654ca0d701ced6674b160df3ff3f5edc88
-
Filesize
9KB
MD5c5eb370a435ffdec4bec88025cb1e13a
SHA1e0b782e1a4ce8d2f280f963ffdf142a47d1cd6c7
SHA25628e31ca474a8aeba24f09792d31be84db2fb232da3d331ad65ee81a7ba480cf1
SHA512a288a24cfaf14c63ea3444d377f66267a5a07e2a07400f1d0338ce65f885c7aa45d84cedb2009d59e0e79baf897fb900bb420935ff284596773bbf80f5d0f5a5
-
Filesize
9KB
MD561c7c1b7c98867d46116610ebeb2bfd5
SHA1bad66e7187b038f1d87ed06b9718d9bdc6e15fed
SHA256da21b24b66ee76b1cce374e950b5b6a4aad82c3231e4ae65ee40cd2770ccbbe1
SHA5123368e6e3232e2ff5e69d2ead5727660bd468fb7035ce72f07a8b8289deb0ea9aeca9b963472ed193aaa60eb59a706b19d69dc014a63bc6f0869605a00d35ca41
-
Filesize
9KB
MD5fde489137470d75d5a1f47c550596ebf
SHA1da555b3a0a2517de8d6332fd29be6380c165a7f0
SHA256751c8f5441ecd87c93cd653c3e1b0fcd55f85aa86449ce3fa2deef2cc1c8eaab
SHA5127847fe512627726231fcc222e413b137a2abecb2ed22a732e84136f468572917efbb237df88a887009bc03e7b2e47cb268d9133a9a2ab9791e33e3b5a89bff25
-
Filesize
116KB
MD54aca6c17148a094774296bf8b383088b
SHA16c892ba2b275833213ee740616d9d8ccff45cc5b
SHA256508e03b25453b2d8c9221d1bb938e38d6355ad192f9144c58e43b5da785c7b03
SHA5128f9084a8212fc6c42ac99d5f0e38219163fbf3c55be5b2d2f529233d4a7d4b259b5312e15579fc5c1a103d636031de0f39a5f50366eadcc4df33023791ad4a57
-
Filesize
116KB
MD5ec114e53330d932fedd4e60da7054a1c
SHA1e4c5cac6d697fdc1a8b7d3307b04b6c56c01ce8e
SHA256c1f15f98740cdcaf0fe4f75c0dc82f288dbab0281954b4e9d57557ab840a8de1
SHA512cc11beb4bbecc7c7a5044ce50e5e2ef386291119e9e97f11326dcc9171702d572ba008471db30c80d72b9d071a2f97878c3f7e12f1a2e164875ad571bd734941