Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 13:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://url2062.inflytxpd.com/ls/click?upn=u001.dCZqpgQ-2B9MFR9qPAn0dLi4Z7CzA1GF2vM82YpZT8AE7ZhRqKiOgdCRlfGHF9fVluZkQq_P8BB7A3zCzHCGZEAKd2MBRo-2B3C79rHGW8bgysnJhxdPAq-2FzapA0U8kGp9D7iAg91NPbXWRfvXdw3yI5S7Z0im64YVu2HwdYRkRcI7qY5n5PYL4o18cF7lb4KZC1Pm03ZeS3hnpcIMExQbjif-2BQKUswPrQ7OKlDn2LAR16k6bT7P6wVsCujD0SwegqrfwqH-2BEDIFtJLRHwXsJVqoavVEqnw-3D-3D
Resource
win10v2004-20240226-en
General
-
Target
http://url2062.inflytxpd.com/ls/click?upn=u001.dCZqpgQ-2B9MFR9qPAn0dLi4Z7CzA1GF2vM82YpZT8AE7ZhRqKiOgdCRlfGHF9fVluZkQq_P8BB7A3zCzHCGZEAKd2MBRo-2B3C79rHGW8bgysnJhxdPAq-2FzapA0U8kGp9D7iAg91NPbXWRfvXdw3yI5S7Z0im64YVu2HwdYRkRcI7qY5n5PYL4o18cF7lb4KZC1Pm03ZeS3hnpcIMExQbjif-2BQKUswPrQ7OKlDn2LAR16k6bT7P6wVsCujD0SwegqrfwqH-2BEDIFtJLRHwXsJVqoavVEqnw-3D-3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133577483417409144" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 940 chrome.exe 940 chrome.exe 3976 chrome.exe 3976 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 940 chrome.exe 940 chrome.exe 940 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 940 wrote to memory of 3432 940 chrome.exe 91 PID 940 wrote to memory of 3432 940 chrome.exe 91 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 4316 940 chrome.exe 93 PID 940 wrote to memory of 5024 940 chrome.exe 94 PID 940 wrote to memory of 5024 940 chrome.exe 94 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95 PID 940 wrote to memory of 3652 940 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://url2062.inflytxpd.com/ls/click?upn=u001.dCZqpgQ-2B9MFR9qPAn0dLi4Z7CzA1GF2vM82YpZT8AE7ZhRqKiOgdCRlfGHF9fVluZkQq_P8BB7A3zCzHCGZEAKd2MBRo-2B3C79rHGW8bgysnJhxdPAq-2FzapA0U8kGp9D7iAg91NPbXWRfvXdw3yI5S7Z0im64YVu2HwdYRkRcI7qY5n5PYL4o18cF7lb4KZC1Pm03ZeS3hnpcIMExQbjif-2BQKUswPrQ7OKlDn2LAR16k6bT7P6wVsCujD0SwegqrfwqH-2BEDIFtJLRHwXsJVqoavVEqnw-3D-3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xe4,0x108,0x7ff98c009758,0x7ff98c009768,0x7ff98c0097782⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1884,i,5170031691115543918,1328332090101829089,131072 /prefetch:22⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1884,i,5170031691115543918,1328332090101829089,131072 /prefetch:82⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1884,i,5170031691115543918,1328332090101829089,131072 /prefetch:82⤵PID:3652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1884,i,5170031691115543918,1328332090101829089,131072 /prefetch:12⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1884,i,5170031691115543918,1328332090101829089,131072 /prefetch:12⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4452 --field-trial-handle=1884,i,5170031691115543918,1328332090101829089,131072 /prefetch:12⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=1884,i,5170031691115543918,1328332090101829089,131072 /prefetch:82⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 --field-trial-handle=1884,i,5170031691115543918,1328332090101829089,131072 /prefetch:82⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2524 --field-trial-handle=1884,i,5170031691115543918,1328332090101829089,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2572
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1400 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:81⤵PID:3888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD574acba44bcbe6ad6ae0a0c6ee096c17f
SHA1def32b4645a670eca610287d70124acd84b3a04d
SHA2569d335115a58dd2441c49a05831c15a4b1a060aedb1010cb7e075144588723904
SHA512fdea4d4e59ab3cd0d67a2c5e1ec0c6333257b5f0724d33c041039e990f99d87e33f316214a4d51866c83fd6a520d71a5ac0b78b185a00bdf91e13fb51097ae40
-
Filesize
777B
MD562dae39b33c1f76b1ac7962acf6d0aad
SHA13d118bb2807dc8512d7a31056227238116587217
SHA256adca62d0fb0c555be095b7e30af4085aa8a7ba4cf8d8e4c0cc91d5a4a62c1435
SHA512f1179bc9a0f54f1a4ec87d01613ad2ebbeaf6f5e71320c28902a43b6dd5b6074d1da2a2bd2c1d21a9a1f02a37d35c02c6194a3a9808b53e4d14f4d0ceb795da5
-
Filesize
536B
MD5c2d8cf79b642132ac5eca48aae2575bf
SHA1cf82ba40286fd5e43b67dc663d2b59ba6dd58973
SHA25605d93ce9b76905ac3df16be79eab87405dcd8f5797f84bef648150edbec0cda0
SHA512f6d5175c6125f4824354697b73de848058a69245294eff2b3bf4a4f77b4036227b740b1d9e1b28302490a73414545e7191a1e063f9820f7507e4f258d953b207
-
Filesize
5KB
MD5c74075d70a4e90659c72527996ae550d
SHA12443b67c64127d108e125ddf8e0b840505ea0c4a
SHA25621d8947d003fc5399c72c6834c8a2ed4dc5f8dea5e7d70a76b853a07bbf79eb1
SHA5123885ebc6f0dcc3ee57b78e7b69a29e9a553ede4c95bef685d00094f279c983630f67a852001fcaf0ad928ae863b4942e8fcc661a3a6621f49d9ad76ecf356826
-
Filesize
6KB
MD5d928defb95ef67d35c8e579df7e72009
SHA1ab72f11876c9d088563ea6ff88e99549819861fd
SHA2569a1a7f76d47172481c4c7010919910e5565f5e1da0acc2d8a83d5636b5a70c03
SHA512cfa6d8a81eea45e51f20f86fda55120ee8f2df07f1ba43f236d0f3765fc92fa8a4a44ac12e1b80383814bedbb7844cf0ec53765e2b3677f6b505f6b1b95f2de0
-
Filesize
6KB
MD5e092c5c9f82e6cd924bbaaaff42b2006
SHA15795618ae5944b6b37a2f06aa4461c65d438db6d
SHA2569cef680d3946d0a1bee49551ca4f1480976d9a405e98354ed3891fa89df6f46c
SHA512a2010b6e8542ee8209ce776618dd7ebba1016b4ff9755aef72b7caf35d5571ba093d4bcee9e7b71adcbe63929e449bb709e168ee27f2c634b41f38f325294743
-
Filesize
6KB
MD5e9da643722389165954e139fd463918e
SHA1a0c8e98cca77192a5a22eb5f767d820ff0deab82
SHA2564293fc6869f3c1b4825fe81108abab189b8942235a0d62d7d9d5ec434b2f33e5
SHA5123eb38990a819d3d6f3f93c3d07e9bdc30d07283498678887875f3d5ac74188412e92e09520c2189f1d10ce00a5dc23a396ef18c7fdf2b5a642401c4b45928a6b
-
Filesize
128KB
MD5f4c07e4ba95fee346dfd1a7fa6fff899
SHA14219ec708abc0dda9517a46da00ae107a17b82d6
SHA2569f67d0a6000dcc1e37d7d42f4affd168af04f435cf724c6440fcd3bc617558b6
SHA51256445193f2d0ff9f4c38897e545bca5a7f16cef31329b63e313a11620dab4f9f0f91994484f2fc517579faca9a93b36038b14c02f75837073047b4d736a412af
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd