Analysis
-
max time kernel
2160s -
max time network
2045s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
unsupported.html
Resource
win10v2004-20240221-en
Behavioral task
behavioral2
Sample
unsupported.html
Resource
win11-20240221-en
General
-
Target
unsupported.html
-
Size
347KB
-
MD5
b26cab8a287607ad7405f84172b043df
-
SHA1
f2636f1c3917c55c81d2f12bf6c100b43eb8bf07
-
SHA256
29e1ba65a6fa7733e25c9756f7da0ff6a0f405a9285854808e1f9e2ffa19d1e2
-
SHA512
287df50e3f7fe2005b0528be647edf9069796c11da9084eab7c7020ec854085a8337b8d3d64cfbd95ed2ab59361dbce5bbed42d61ed9f55043fbbf6183b413f0
-
SSDEEP
6144:J6kf3oCwQISNt1/X9bgM123gIfg28r5f2f73ERz6:ngCt9bgM1njr8z3ERz6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133531340572488904" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4700 chrome.exe 4700 chrome.exe 3448 chrome.exe 3448 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4700 wrote to memory of 4240 4700 chrome.exe 84 PID 4700 wrote to memory of 4240 4700 chrome.exe 84 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 184 4700 chrome.exe 88 PID 4700 wrote to memory of 3436 4700 chrome.exe 89 PID 4700 wrote to memory of 3436 4700 chrome.exe 89 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90 PID 4700 wrote to memory of 1392 4700 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\unsupported.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe89af9758,0x7ffe89af9768,0x7ffe89af97782⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1856,i,5300025165159728144,9762588566008245103,131072 /prefetch:22⤵PID:184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1856,i,5300025165159728144,9762588566008245103,131072 /prefetch:82⤵PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1856,i,5300025165159728144,9762588566008245103,131072 /prefetch:82⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3088 --field-trial-handle=1856,i,5300025165159728144,9762588566008245103,131072 /prefetch:12⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1856,i,5300025165159728144,9762588566008245103,131072 /prefetch:12⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 --field-trial-handle=1856,i,5300025165159728144,9762588566008245103,131072 /prefetch:82⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 --field-trial-handle=1856,i,5300025165159728144,9762588566008245103,131072 /prefetch:82⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4776 --field-trial-handle=1856,i,5300025165159728144,9762588566008245103,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2672 --field-trial-handle=1856,i,5300025165159728144,9762588566008245103,131072 /prefetch:12⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4036 --field-trial-handle=1856,i,5300025165159728144,9762588566008245103,131072 /prefetch:12⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bb0a24bbee7a93d9d328b41d17d93794
SHA1455d9201d0b01ec7264b49258e871498483b6264
SHA25629b7df070fadb90da407fa4d630361d5552bbb777c5d9ff2a38d2323e2322163
SHA5122490528ebb00898b866b12987258748562192f866bb9e1789dab6e5309e636f2ace4af77ac1ca07bc22a51911f5b55f7017bb05e32bbe77cdc144bdfb878dcf1
-
Filesize
1KB
MD575d06019dd4f3d0c566253c1298fa763
SHA1802cc0fbdc6c35785510a7d86bf7a2d19680d41a
SHA2561c4184a31c9895750b8e78a1053acf5ee7f4efa398edf5dc32ec002b2e5eaddf
SHA512662c02b6bed7686506c784cb3dc16e3f685052565d5aa2a1bc4c7b16fc9452fe1d0f1203e8df07ab8f59460efeb0cef3a22d104353a8cc992695ab0ea0861716
-
Filesize
2KB
MD598d3f707608b8b0cfaab6bacebe9f515
SHA179c4b3de4f767878635a97d81a067f6a58f5373c
SHA256d1b6ef56fa9f2d92f16f29701ce069af8470107fb1e734ecfd91645363399ba2
SHA512b532abed77c1e11b24de8af945871b3ee3521aa338fb2162846bd7c2bf9c755101f2eda88021a36ca5871adc1036b666d21cda9cc08549b5de68ed62a7cfbec2
-
Filesize
1KB
MD51d3a94d3607fe22d2ff66df51b7f8ae4
SHA1b45d946353ef9b93fa892ce6d36943fb05b83916
SHA256dcd17fd94f4f0662a61f44f325274f66cc8347aa2320011cbcdc0e9a32953468
SHA512fc184e787391ea08cced08ece51f8f3df26692e8c03eb6cd961353405166798647b2ecb6d8b4f4ffb9bb2e2a920f275450349394472c03881537683bd44510db
-
Filesize
371B
MD50d981be1790c83f97d0b6c5d27f81d89
SHA15c54a76124f089bbbf5bda68e46274e264ad47c3
SHA256c7df49aba34fbd8b1ef0c4ff265270327a9aa8644105504113e004bf24c5869c
SHA512d45e26efa8c78011b42f616d5bf1da45f63e1e4c3c12a1e7946e1763030049ab7581ea94bf0e4afe977d7e1a88a97bbbbb92a67e140174f99c6d252310c1ff76
-
Filesize
6KB
MD55795262f5721da302a52fabf385755bf
SHA1734848d81e47812209a6ed2c98b1d291d8175773
SHA2569308e4d47c26fb6e6a447d912ff9a7d7094f490ab227f637ada869193b1291e0
SHA512dd98cebf0d6ed58dd3f81d96a9b77bda9235c0fab1f0b30c06eb2924fe272c11c0b25fa418840aa60592f2a6c55bb1c38afb0bf5110adb61ce3411862198bd9f
-
Filesize
6KB
MD5c9e78b1f6e53cded993f340a21e2e1aa
SHA1e55e1e59db058117db46549538216f237d93f494
SHA25661bbeb2be4dd32d3d85a4d9f9f417bfcb37f8f3c622e6d20ff671091ad172203
SHA5125f1d80a37931fc8a62174c8fbf9e507a5e3f9f856770b046525ecb448dc924a77eea347cedf4516d9844d7a2c6f459de3ebe4d10c41b383e3fae2ccc5ce36258
-
Filesize
6KB
MD55bfa9458b88a1bfbcf505887bcbaeaf6
SHA1abc9d14c718b3eff7677a56aedec969157554973
SHA256df48dde1fb28f1ed1d94ca1a9a90882c4761cf9a746da9e56433e8940526e01f
SHA51276358bd0bad0b613d8616bf256077fb29635e5fc003183aadde827a716745d2c0db8cd5ce0596c79b7a6a8a546559fbb51e5e348e069f4a0c0b0d30586c4d373
-
Filesize
130KB
MD505dc38403d2f01fe5838fa1adb4991ab
SHA1af3681319c4c90eeeae52828575419ced5cbc38b
SHA25662d7c235a12241f4e4cf56c7697fe2e20e881c304317a656eac4e4496319ccbe
SHA51271c8ffc5482381812f3858dcf58fcf4771ffe13e97999acdf1e2c9884f93146a358b8ee9027e91babffc5f55a21eb6d37585d611a494ec3422cf17fb19575112
-
Filesize
130KB
MD52fed2d2a6ed49b776c5510cfa7f953d7
SHA125c057264e60141d9f5a4e731ca4a0b93a1fbb6e
SHA2560a843713ed3b5339103942a2564ee3d9620d877e0718d3426faf54df24943a02
SHA5124a73b3f6a1d85038142a04c0bc3355dacca485c0aa907986f97fd61916eaefa1b92f3c16512a495bbaf3ea55851d752e4c94f0af575aa6eb605f97cd41eef093
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd