Analysis
-
max time kernel
1799s -
max time network
1689s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2023 06:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://vmi1515436.contaboserver.net
Resource
win10v2004-20231020-en
General
-
Target
http://vmi1515436.contaboserver.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133453679138797113" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4836 chrome.exe 4836 chrome.exe 560 chrome.exe 560 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe Token: SeShutdownPrivilege 4836 chrome.exe Token: SeCreatePagefilePrivilege 4836 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe 4836 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4836 wrote to memory of 2804 4836 chrome.exe 83 PID 4836 wrote to memory of 2804 4836 chrome.exe 83 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2280 4836 chrome.exe 86 PID 4836 wrote to memory of 2748 4836 chrome.exe 89 PID 4836 wrote to memory of 2748 4836 chrome.exe 89 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88 PID 4836 wrote to memory of 3588 4836 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://vmi1515436.contaboserver.net1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a9d29758,0x7ff9a9d29768,0x7ff9a9d297782⤵PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1836,i,12502278370039000594,1858540507855933948,131072 /prefetch:22⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1836,i,12502278370039000594,1858540507855933948,131072 /prefetch:82⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1836,i,12502278370039000594,1858540507855933948,131072 /prefetch:82⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1836,i,12502278370039000594,1858540507855933948,131072 /prefetch:12⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=1836,i,12502278370039000594,1858540507855933948,131072 /prefetch:12⤵PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 --field-trial-handle=1836,i,12502278370039000594,1858540507855933948,131072 /prefetch:82⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 --field-trial-handle=1836,i,12502278370039000594,1858540507855933948,131072 /prefetch:82⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4956 --field-trial-handle=1836,i,12502278370039000594,1858540507855933948,131072 /prefetch:12⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2900 --field-trial-handle=1836,i,12502278370039000594,1858540507855933948,131072 /prefetch:12⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3852 --field-trial-handle=1836,i,12502278370039000594,1858540507855933948,131072 /prefetch:12⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=212 --field-trial-handle=1836,i,12502278370039000594,1858540507855933948,131072 /prefetch:12⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5000 --field-trial-handle=1836,i,12502278370039000594,1858540507855933948,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4544 --field-trial-handle=1836,i,12502278370039000594,1858540507855933948,131072 /prefetch:12⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3928 --field-trial-handle=1836,i,12502278370039000594,1858540507855933948,131072 /prefetch:12⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5044 --field-trial-handle=1836,i,12502278370039000594,1858540507855933948,131072 /prefetch:12⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5024
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4832
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:4336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD58cf9d3118533cb9552da3ab36f6de78d
SHA17fabf98d01871b59c24585f06d68d11f72f166ce
SHA25624811bb4cf916898d6b3beed1dea299cc241dcf6e4a657f91bf93ed30338a853
SHA5127fcfc923216a522f8b2a29355b0c6557bad78444e282243c36e8bad3a6f3bf7ed7ba4f967f9c1ac0b2fab66320648cc84e7d87997755522a5d17400fdeea0e1f
-
Filesize
823B
MD54187965b3df2ed991e2cdec5de0107e1
SHA1fec5535f636c4477290b01d1494e9e31af77cd0c
SHA2569f484156e54dfd2644ad679edcb75346f4db081543a5e3f736dd9344588e257b
SHA512ef154737b7910c48c6ece2a9be11a3a7a0005fa6dcc0dca1c18176d358a72c0620881a0db30069fc653b60934eda55f31df2ff56bb26468cca090b7f89b896ba
-
Filesize
6KB
MD5a874be72345e3a496fe0061079309f2c
SHA19e185e4dcf89f1c5207055db2b0258386547a764
SHA2561b478eaf31bbd11d043f67d6d1ccd5c49e7c7c34333ca0a978ec3c7b22eb1936
SHA512c74ccfb93c2ad235052ea7492b979f48ab550c671532dfba8db0b39199997fdd11916766d962094e50a360312d9024b88cf638ef7b855dc684f11457b0ad6698
-
Filesize
6KB
MD5c1ca0b1c31e53b43e9634df6a20e7e51
SHA1617c5c282608f125155cace1e014b9d70dfddb87
SHA256b7ede0e3916b5929fdaad3027d15cbb5c437bb5e0666ec645f7379b2c570975a
SHA512cf76882fa1f709cd7d1ba4ad002e151929ad035f7b2cb07f8b901f58516fe5bb0a389cc98a3ab3f51575193dc155c5bfd4d44b912ef5909267d8783d55454c2a
-
Filesize
109KB
MD5c6f775a5d77b28373e7e4cec172cd03f
SHA1c576d288b937ce14d37218ca546155d32f001480
SHA256a94556045a9c821ba63c61be279aaaf327241835a38e0c221eb95d9f0d3c6ad5
SHA512d84033e70c2e0d4f4080f5765f155a930971d633aa1c595bdf12aea8bcbd5f095cbd0c3138aee135bea8f37651f0e62d3f1f1caa7f78e065928eea62cc4b17e4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd