Resubmissions
11/03/2024, 17:07
240311-vngxhaha2v 711/03/2024, 17:06
240311-vmkl1agh81 111/03/2024, 17:06
240311-vmeezsba57 111/03/2024, 17:02
240311-vkmctagh5v 1Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 17:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://files.minecraftforge.net/
Resource
win10v2004-20240226-en
General
-
Target
https://files.minecraftforge.net/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133546502151028948" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe 5456 chrome.exe 5456 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeCreatePagefilePrivilege 2076 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2076 wrote to memory of 3780 2076 chrome.exe 89 PID 2076 wrote to memory of 3780 2076 chrome.exe 89 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 3804 2076 chrome.exe 91 PID 2076 wrote to memory of 1340 2076 chrome.exe 92 PID 2076 wrote to memory of 1340 2076 chrome.exe 92 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93 PID 2076 wrote to memory of 3088 2076 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://files.minecraftforge.net/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd20599758,0x7ffd20599768,0x7ffd205997782⤵PID:3780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1816,i,1140664732286323240,10351315207199143720,131072 /prefetch:22⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1816,i,1140664732286323240,10351315207199143720,131072 /prefetch:82⤵PID:1340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1816,i,1140664732286323240,10351315207199143720,131072 /prefetch:82⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1816,i,1140664732286323240,10351315207199143720,131072 /prefetch:12⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2968 --field-trial-handle=1816,i,1140664732286323240,10351315207199143720,131072 /prefetch:12⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5144 --field-trial-handle=1816,i,1140664732286323240,10351315207199143720,131072 /prefetch:12⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4864 --field-trial-handle=1816,i,1140664732286323240,10351315207199143720,131072 /prefetch:12⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 --field-trial-handle=1816,i,1140664732286323240,10351315207199143720,131072 /prefetch:82⤵PID:5408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 --field-trial-handle=1816,i,1140664732286323240,10351315207199143720,131072 /prefetch:82⤵PID:5504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1816,i,1140664732286323240,10351315207199143720,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4532 --field-trial-handle=1816,i,1140664732286323240,10351315207199143720,131072 /prefetch:12⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4744 --field-trial-handle=1816,i,1140664732286323240,10351315207199143720,131072 /prefetch:12⤵PID:5232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5964 --field-trial-handle=1816,i,1140664732286323240,10351315207199143720,131072 /prefetch:82⤵PID:5568
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
792B
MD5bb7d83b5bcb0fcde25ea76674b0a6a76
SHA1fa0e7e3ffe68760a7bdc931e00733fcc3ee0d180
SHA256ce57407c75c5953123e68d5db619d5a337118319c1f85ac005e8936a0f864c1d
SHA512bdd09a8362e6809cc6d8aa18986fb1674bd0f5c1956967f5f595275551db122d3f9a130c387c0d5c371227c042fb92332313bf635d927d1eb320f33c867b9381
-
Filesize
6KB
MD51e36a39dc5e6ad9b33f60b089b86c116
SHA10fbc793a47b43d45378b13cd62eb414ed6eb7504
SHA256f86b815fbf936b04471fe63c4596d8178fa2a82af89f1d5a8d65307b9498d5e8
SHA512bd15a381387cc34cf5a05a7cb06cb6e45d9bab1c0be968950b3d4db2a733d16bad9d5da7503d957206b86a6e375bf62aaa79d81b2e9111bbf660bbb04ea88359
-
Filesize
1KB
MD58d69990b9ef745fa3f0d06eede0214e7
SHA1a355f0fdc347c0b027689d2a01383ef64d5a7e2f
SHA2567fe36c52637517bb5c4b890b30a0a9450f0ce0ae2bd3aa9894a2a128a7dea03c
SHA512d5623011844873c8f47db1e295ffc1345dd22a2c93d44ff9f7da112cc51fd8e1a204a00d1e0cf144e43881bb05d5f902bed234a93e81443278f37ae76d17e9e3
-
Filesize
2KB
MD5fc7df7c9aecb7c8b7005ffc8d1cbab01
SHA193678a99a535758698da7a112a7194172fb80278
SHA25650fd7dbbd04418280cbea349fc07984bc1cb85ab62946030332a0295b011fe00
SHA512e1abcd37dde33553b7059c21743c746490417e12226f3c22462fe9fc438d7998134635c15ad890f1f6540d96fae17a2ce39a27fa1c017a79373e51a73d1d9998
-
Filesize
6KB
MD52dc0be74c3283bb1739db4ef4bd69e3d
SHA1771bdf8741cc1ee02f373f83ee70ec944df3843a
SHA25676ae4598e7121f8b521193a10b2375e9e662f2619d6f2ab73344ac6ceef48c78
SHA5129c0ed14c6c737b69531ec0ca0567010f15bfc0c7e5c051a549b44679541b7f4a97cbf2c248d5c46f7089ce79ae18bfd72e69013d323de365c0898d5c4bd5329a
-
Filesize
128KB
MD5a0b5ddfe62971ba410af047a3a49b36c
SHA1cfa12599a2d06847a1d82259866b80651ac398b6
SHA256c9c56bfdbdd5de992ce15bd46806d43b194cb4c0b845de53a6bd5a4afd465dde
SHA5121371710621921b22070544654ecacb176927a853c67de9a562f4b79731548c73c3f5f288da3b2548c77be3accb6f1b0c5303012b58e6e8056c7b871c2b98420d
-
Filesize
104KB
MD502d3f82076c15b1be150a0b154ca8962
SHA15766c08bab689058dc1ef33608f1cfc2642b0166
SHA256986c05f7411312c383873194e6b05189f25380eacee8a2b5c2de8fd37d5b2629
SHA512d8b770713692d9371f4e7364b5af1602e9f68bd8098f90d7f8b6ab01b62044c15b2bffcb2a71c90a898effaa8de1f431251cb2c24cc9238a91668f0c86e4466a
-
Filesize
101KB
MD5e27b97bec33ede81b3523aa19317558b
SHA1a722de0fdadeb5ed4b8d63c59e865136e76b1386
SHA25691792708ab4cceff25a6d07f2fdd66b05eb85bf0a1250a37b20af0e4021e8d3f
SHA5128bf6183102bf58781de86ff39c44859161356287bbf993001a0b6c2dc927f49e0d917e8f0db7ed55577e2289cc1ccd9f8c2f891fde00293ef4fa29acb51de27c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd