Analysis
-
max time kernel
299s -
max time network
281s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02-06-2023 23:29
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.bing.com/ck/a?!&&p=2e0971c631d06b58JmltdHM9MTY4NTU3NzYwMCZpZ3VpZD0yMGFlMWZhMC0wOTIxLTZlNTYtMDM4MS0wYzgyMDg2MjZmMTEmaW5zaWQ9NTE0OQ&ptn=3&hsh=3&fclid=20ae1fa0-0921-6e56-0381-0c8208626f11&psq=https%3a%2f%2fposadadeltigre.com.ar+sauce&u=a1aHR0cHM6Ly9wb3NhZGFkZWx0aWdyZS5jb20uYXIvc2F1Y2UuaHRtbA#ZHN0b2VockB3aW50cnVzdC5jb20=
Resource
win10-20230220-en
General
-
Target
https://www.bing.com/ck/a?!&&p=2e0971c631d06b58JmltdHM9MTY4NTU3NzYwMCZpZ3VpZD0yMGFlMWZhMC0wOTIxLTZlNTYtMDM4MS0wYzgyMDg2MjZmMTEmaW5zaWQ9NTE0OQ&ptn=3&hsh=3&fclid=20ae1fa0-0921-6e56-0381-0c8208626f11&psq=https%3a%2f%2fposadadeltigre.com.ar+sauce&u=a1aHR0cHM6Ly9wb3NhZGFkZWx0aWdyZS5jb20uYXIvc2F1Y2UuaHRtbA#ZHN0b2VockB3aW50cnVzdC5jb20=
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133302221926404031" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2480 chrome.exe 2480 chrome.exe 868 chrome.exe 868 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe Token: SeShutdownPrivilege 2480 chrome.exe Token: SeCreatePagefilePrivilege 2480 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe 2480 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2464 2480 chrome.exe 66 PID 2480 wrote to memory of 2464 2480 chrome.exe 66 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4116 2480 chrome.exe 69 PID 2480 wrote to memory of 4584 2480 chrome.exe 68 PID 2480 wrote to memory of 4584 2480 chrome.exe 68 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70 PID 2480 wrote to memory of 3060 2480 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.bing.com/ck/a?!&&p=2e0971c631d06b58JmltdHM9MTY4NTU3NzYwMCZpZ3VpZD0yMGFlMWZhMC0wOTIxLTZlNTYtMDM4MS0wYzgyMDg2MjZmMTEmaW5zaWQ9NTE0OQ&ptn=3&hsh=3&fclid=20ae1fa0-0921-6e56-0381-0c8208626f11&psq=https%3a%2f%2fposadadeltigre.com.ar+sauce&u=a1aHR0cHM6Ly9wb3NhZGFkZWx0aWdyZS5jb20uYXIvc2F1Y2UuaHRtbA#ZHN0b2VockB3aW50cnVzdC5jb20=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa03d49758,0x7ffa03d49768,0x7ffa03d497782⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1688 --field-trial-handle=1780,i,5625775644050837505,6524444603813716037,131072 /prefetch:82⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1780,i,5625775644050837505,6524444603813716037,131072 /prefetch:22⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2080 --field-trial-handle=1780,i,5625775644050837505,6524444603813716037,131072 /prefetch:82⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2980 --field-trial-handle=1780,i,5625775644050837505,6524444603813716037,131072 /prefetch:12⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1780,i,5625775644050837505,6524444603813716037,131072 /prefetch:12⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4408 --field-trial-handle=1780,i,5625775644050837505,6524444603813716037,131072 /prefetch:12⤵PID:420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3140 --field-trial-handle=1780,i,5625775644050837505,6524444603813716037,131072 /prefetch:12⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 --field-trial-handle=1780,i,5625775644050837505,6524444603813716037,131072 /prefetch:82⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3036 --field-trial-handle=1780,i,5625775644050837505,6524444603813716037,131072 /prefetch:82⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2352 --field-trial-handle=1780,i,5625775644050837505,6524444603813716037,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:868
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4536
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5dce55b7b78ce808860fa47bd1b7f2309
SHA1ea68b9e572e32d5e7c92b74eefab319073fdb723
SHA256d121d192b3f7bfe8f271976996e2361adc83c633f3b37947dcf58f6a6b3eb23c
SHA51272481363aca2ae4385280283f46a73d83768425d29a1237d5dfb10996181aafcec417ef31c630ab07d7491e4838f1f2d670dc8770ddd8f5a8a66451532167a5a
-
Filesize
1KB
MD5cdb4b4ede7e1d12f0ecb3e317732dbc9
SHA1efbd15d8cb5467b2f9f89d032483a8acc2d95e6b
SHA256cb3a1d59bec5a09a8ac094f3d98b3021d9cca560e2c870cd621a8d21ee9bdd78
SHA512116518b0d087ae46e977034951a3fa22a1c144b195c11c4c70d72b0291b2dbd0273293e994cdaadc28f00c9c4154d4daf270e33c84f52d00d037841e6109dcfb
-
Filesize
707B
MD5f3430c1907610f5a170a2e1e32cd50e7
SHA1923690c13bea39726e879c91e8071d0a600d8df6
SHA256a6836090ec5bfc7fda992a25e333925486425475352bc81b27146432202145aa
SHA512c7146f1ba73da580d348ed953105f11e28fbfb3198dec2392a4629f5630bb5f0307a4e6d2141414f3f1806fb6beb52de551e86bfa27ce4b2ff7dff8ef92241f9
-
Filesize
6KB
MD59044e3e22462aa00aa5fb66f54fe8543
SHA192d6869fded2032caac59396c65c5d5d56753a98
SHA2566fd6b053074a15e2e2dc1d40dc30ebd6e18908494d597b23e353f64619f9a456
SHA5122171925302ad8254b9735ec0e1a39bc9331be5159710ab1e9e4db4ec8b8148f9cb06d2f4cf1973d07fdbcc5a6bbc4e5b97fe5e79ae26382da87972dd52f62d0e
-
Filesize
6KB
MD543dbc27cf3347dac9192d4b538043bca
SHA13cfc1610421cd151bbe0949b002e462cae0ef921
SHA256a9b40505d22858afe093ece9bc63fad5cda3cc1cebdbcf9c55650ab0b739ff40
SHA5125fdd9fd2a761ceb5569eb4a9e3a13e447bd12dbc88bb47208f598fc4014072938121605faa17471fa0abf93690d17248d9007f3ab0b56d796fcd7b6401ef3c3e
-
Filesize
6KB
MD5a8b779d00760186045cf87f4f33b5f4b
SHA1e62f775477da7ed88c9c633568d56345b6c711f6
SHA25663df3d4381ef0d1b74216cf0feb4f389774bd7c7c5b3aa66bcb9742fe40bac07
SHA512c815da5e282bcfee7337c60dabd08c52afdf7707659558b1f5114271d1bc411f47b720ceba4f7df4ada0ff157db2f62ae7431189a0dd7348edc549d5283ec360
-
Filesize
158KB
MD5f7820eabc380fb033e19cccddbf6588e
SHA1905ecc96129e8d9289d557f7deb486d2eebfbbd7
SHA25664d2adb9aae5cc8a560c7482702c5d0e38eb75ad1235f1e72d249ddb3d68883d
SHA5123bdc30204cd9fa59fbd72e032653e55223f2e4f0ab4ce73389b809ae9f343b36d7e3e10fc47bb998b122c56af95362c269060e988393c1d9b5466b535cbd90f7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd