Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 23:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://acmastersjax.com
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://acmastersjax.com
Resource
win10v2004-20231222-en
General
-
Target
http://acmastersjax.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133495769508567007" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2852 chrome.exe 2852 chrome.exe 4508 chrome.exe 4508 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2852 wrote to memory of 3676 2852 chrome.exe 59 PID 2852 wrote to memory of 3676 2852 chrome.exe 59 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 1316 2852 chrome.exe 92 PID 2852 wrote to memory of 4888 2852 chrome.exe 94 PID 2852 wrote to memory of 4888 2852 chrome.exe 94 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93 PID 2852 wrote to memory of 3744 2852 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://acmastersjax.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbda19758,0x7ffbbda19768,0x7ffbbda197782⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1868,i,9975016379503443481,3053367051267907154,131072 /prefetch:22⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1868,i,9975016379503443481,3053367051267907154,131072 /prefetch:82⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1868,i,9975016379503443481,3053367051267907154,131072 /prefetch:82⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2892 --field-trial-handle=1868,i,9975016379503443481,3053367051267907154,131072 /prefetch:12⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=1868,i,9975016379503443481,3053367051267907154,131072 /prefetch:12⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5108 --field-trial-handle=1868,i,9975016379503443481,3053367051267907154,131072 /prefetch:12⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5052 --field-trial-handle=1868,i,9975016379503443481,3053367051267907154,131072 /prefetch:12⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5124 --field-trial-handle=1868,i,9975016379503443481,3053367051267907154,131072 /prefetch:12⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3412 --field-trial-handle=1868,i,9975016379503443481,3053367051267907154,131072 /prefetch:12⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3160 --field-trial-handle=1868,i,9975016379503443481,3053367051267907154,131072 /prefetch:82⤵PID:5268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 --field-trial-handle=1868,i,9975016379503443481,3053367051267907154,131072 /prefetch:82⤵PID:5360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4780 --field-trial-handle=1868,i,9975016379503443481,3053367051267907154,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201KB
MD5e3038f6bc551682771347013cf7e4e4f
SHA1f4593aba87d0a96d6f91f0e59464d7d4c74ed77e
SHA2566a55e169bc14e97dfcd7352b9bc4b834da37dd1e561282d8f2cc1dbf9964d29a
SHA5124bee876cea29ad19e6c41d57b3b7228f05f33f422e007dc1a8288fd1a207deb882c2789422e255a76c5bf21544f475689e7192b9a8a80dc2e87c94ee0bc6d75f
-
Filesize
816B
MD52b6a5d647af39f1d780fdb9960100c6d
SHA18f2c533d11d19ee17340b2b1937f58f02db44e2c
SHA256c2ab475ec6af0295d9c143f93f1f56a25abe5148a6453ef8f0a574a65c45df6e
SHA51243b16a8fb437e70285d0fb23ee37ee23f6510eb9945ba3cc6c141f82c52c590923d7c5fd43bfb5f0edb67b796fee139ff74599a18e780c9df504a2c969e327db
-
Filesize
1KB
MD548bf3b33c354eeb0f5987ce609eabe41
SHA166ef2a8fdc2ad74e6869cd40188ab672100617b4
SHA2564c4535908bc7bd2041be7f21aaf628bda9c3e8f54d3c75df0e3a1003b9500378
SHA512259ef53d9e675269b468666624fa88020860f9d745306cf0a5e8ad039be62d8f9ff06b8f2a08c0c55e98b219382fd5a547e8f4016338b9e9326f55a714917472
-
Filesize
5KB
MD5b4498c37f5c1a3bf86e04511a2b75d28
SHA1c2ab5f3e55f2f7dd932746ab475112dd94027529
SHA2566c735a8955e10a98633d6cef86cae182aae47a3a47916c59a433dc4e13f42168
SHA5120dd142f5dcf1d02854719a6c955b43b0ae5110162df70c27d85c11e6089ef9b9bdd0cae8ecabfb8a3fdc0f985b8cf558ab2fe047d1d1d09dacdcd158cf33dd82
-
Filesize
2KB
MD50c9594a0ddbd55de674518b31528b56c
SHA1b867a6def11873573464d109692856fd53053dd8
SHA256241ba38a1d3ed2fd2a0a0a5ae9d1476a5eae5312500dc75c5fdf7fd606206216
SHA512d0d2872340493d9a42d8dcf9a34ba65e601ec13b6644e0289a915812046a20fad223436c138ba2c06983c9e65453e52fb14fec7d3a9f5b1a28d10ba0766115f0
-
Filesize
6KB
MD5932b1632872f728a2aa329d6f6a92667
SHA11c90ff4a80444ce4e274ef419f49a947a9b744a1
SHA2563dc057fc459761de0b8b6c18353de8c3e8385ca88534f189fbcd6252a62653f5
SHA512ca6032fba3eaa8b2eb3265832dd709e260c9c987f629921b0dee858d837f15f7518757e63ace02097f935225a4b365741d7d1db04a14bbbd2dff23087c586989
-
Filesize
6KB
MD5ebe11f34ce72ff28940ae6ef9e7c811d
SHA1098cea8749977b5b98376164fe61333e44934917
SHA256a14496ef9f3bdf8e581b0abf6ea736d7f191dfc43dd7489a424914d2dc7f3e96
SHA512c1b955efcfe2619ce28ac66fa8aaf18e7889bc484a06b717b7b9aeeec7c145be69ff3d6d814730f0c71bebf318c03fd2005c7fcc51faa9d95e9868d70aea2f3a
-
Filesize
6KB
MD5a41effa6602389d0df7facd872ebc4b4
SHA1635d1638ca1fea62c6a155155f786e7bd34bb7d6
SHA256135f65d152cde135c08b40496f3ad036b2916b60e8c78891ace9b0b30bd61d2a
SHA51221009a3aad331997e39f92b48b524f64fcd9de88b57fa95b8c979c76fcaeeabbe9ae5fe4d52cd03f9352c632edfcef1211a2058b4d6168e4317fec8b409a8aad
-
Filesize
114KB
MD5c64cf97fe5bcf6adbde21e9a45798b80
SHA1be8da5d07d14aa538e77110882ac6e29b2959bcf
SHA256d4f00b8b2b1921f2606cb67c27b49ea0d577d1a6a7f02ad4147253bf2d00ff31
SHA512c15683f74073eff03145d5cbe0b8919b01c29f75d12fc903dbe69230951e1220378a89c62de0162012a66a16102107eae745cba989bbd3e35f4f761d598a81f6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd