Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 12:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fdoodle.com%2fmeeting%2fparticipate%2fid%2fb4YyK2Jd&umid=3b726a80-02e2-40b8-902f-66d5c9c4d5bb&auth=84247b409afe2128671efe0c5790aaffcd4c1d5f-bfbb38d8e1c5242aa1a5bc670969c383246d89ef
Resource
win10v2004-20240226-en
General
-
Target
https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fdoodle.com%2fmeeting%2fparticipate%2fid%2fb4YyK2Jd&umid=3b726a80-02e2-40b8-902f-66d5c9c4d5bb&auth=84247b409afe2128671efe0c5790aaffcd4c1d5f-bfbb38d8e1c5242aa1a5bc670969c383246d89ef
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133620655107662215" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3400 chrome.exe 3400 chrome.exe 412 chrome.exe 412 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe Token: SeShutdownPrivilege 3400 chrome.exe Token: SeCreatePagefilePrivilege 3400 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe 3400 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3400 wrote to memory of 4184 3400 chrome.exe 91 PID 3400 wrote to memory of 4184 3400 chrome.exe 91 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 1280 3400 chrome.exe 93 PID 3400 wrote to memory of 2368 3400 chrome.exe 94 PID 3400 wrote to memory of 2368 3400 chrome.exe 94 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95 PID 3400 wrote to memory of 1380 3400 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fdoodle.com%2fmeeting%2fparticipate%2fid%2fb4YyK2Jd&umid=3b726a80-02e2-40b8-902f-66d5c9c4d5bb&auth=84247b409afe2128671efe0c5790aaffcd4c1d5f-bfbb38d8e1c5242aa1a5bc670969c383246d89ef1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffe8b759758,0x7ffe8b759768,0x7ffe8b7597782⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1872,i,11525195809573861680,10756982000912026098,131072 /prefetch:22⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1872,i,11525195809573861680,10756982000912026098,131072 /prefetch:82⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1872,i,11525195809573861680,10756982000912026098,131072 /prefetch:82⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3168 --field-trial-handle=1872,i,11525195809573861680,10756982000912026098,131072 /prefetch:12⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3172 --field-trial-handle=1872,i,11525195809573861680,10756982000912026098,131072 /prefetch:12⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4812 --field-trial-handle=1872,i,11525195809573861680,10756982000912026098,131072 /prefetch:12⤵PID:1680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 --field-trial-handle=1872,i,11525195809573861680,10756982000912026098,131072 /prefetch:82⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 --field-trial-handle=1872,i,11525195809573861680,10756982000912026098,131072 /prefetch:82⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3192 --field-trial-handle=1872,i,11525195809573861680,10756982000912026098,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:412
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3632 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:4188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD539089ebf2d1f5ae0a52cc1fc88cbc52d
SHA130bc3a13793171f9954e1a92d9addd4369ba1f35
SHA256454a5afec3a027612d81d6a8b3dd92bf3fbc2ab994519aef7dc1c4a57834f709
SHA512f8d628de8211c8e178093e8e8a48f3740876b22802ae5fe18c647df529cfa1dfafc64f3c6684e4b0f9d855c612b4e76c81ff8500703663e885889e6af263fb1b
-
Filesize
1KB
MD54ea7b28867ee58507471aeac5e00e028
SHA1aad3765c69ec2533ea0a1e42513aa876ecd260a5
SHA2565b850a82cca9cab39024dd439bd30c5b3e85979848cf00f78db365e3a1338608
SHA5129c7ac0a254637f4608592cfa579b9a29249f20ce2b977e232b34ca2b0f43a4e3feab258cc3fadfe39310edb565093f2b85d40c5976956c328aff16fc0a63fbf3
-
Filesize
1KB
MD5fa976dfed96cdf684d33614871063ad1
SHA1af1d391251b4857ef5e879ed5765ad61f5fe0302
SHA2562bf54e98b89b48a2581658d628580350b066b10c24131396559397e8eeea566d
SHA5129d930a786926540b2f8838dc0be6142a44290fa56334df21a0ea7ad93292374c8cf033de273dec6b415bf24686721c12d08fcae885224a88a040e2bd850525cc
-
Filesize
1KB
MD5f2ecf7a9e2214164c714cb5997003179
SHA1474886c7d309db0d671131be88475833be65e073
SHA2567f06381f77fad131f98990c1149df99402e56338eed12e6e2e5a2756b4f3fb07
SHA5127443f3df179e3ac66a71a8fa9c2a57b4135382ad96ffced268c625d805f03a03e95adfc91f8325121c69856dccc1f8a3f435edf3cdcd2b2ebc860c64284668a6
-
Filesize
5KB
MD5be2906b013bd9e632357ea65d309e930
SHA19b721f4b52495a725bb16f7cf330461b4390d5fc
SHA25680e791872ac8c4a06b21964312e99e13544a6458b7aa2396ab4fba69f180812a
SHA512791c8a9658f74fd2d894a86fcec86e21437cdd0f6226b733d4e78f849b5fcd6ad0bd2a1119eab899b92959a22f7a1c594eaaa25f1060498b985b3cd3b6a6a996
-
Filesize
6KB
MD50ebd5df3762712309d9dae320c29f178
SHA19a6a0a87847e20cd7c9004c4265109d0945e371d
SHA2568cb024f2dcad4787708ee556d26118a1bcb4a2dbde646fc6637c3b651e14810b
SHA5124a9ba5db086eb5b5f37ca0ef6a5af4f7eaae43e5f84da56f0b9a8ebe3517f0432ed13cdfef1bda29ac704a5df664e57ebdc1454ad53c99427da0712726fa2ed5
-
Filesize
6KB
MD5eb210aa547389359f27f19658ee894f1
SHA15be5bbb1075407d16f3c64adfec5fa0e9cb26319
SHA256213e38d74ea5f7bfe04367012e0843c40d64708f620bf0eb3c1537009c9e6200
SHA512edb98c9ff639c9a48d16c91eaed7a7fc7b1794cf7119460aadad98512495adb89f5c49999d5bddaf52d42c15fc3fa48ed8e4df161855a81b874fbdf4b6336854
-
Filesize
5KB
MD543c3eb086f67cf3f5813e0d46f996ae0
SHA1ecd29945d4f0ba8e27dce5aba2bdbf6c54381e1e
SHA25627045034f7b72c1daabbe0ba82df794bf304db8d57cc3de80d4e8fd651b6fca3
SHA5121a68fce9a8bc784dceffdb2751b85d605a3d07ab1c89fb2854954cafb9961a339bb97ddb3c625148c36f1f59e34580f82669fe8b11c52a35b947af1a14d87b36
-
Filesize
128KB
MD52dd916a0d96548fe64bbbf44b5e5ebac
SHA1046c9e57e57150539628d53c586362c338ce74cc
SHA25631fd67d2cfd74fd3b8a04c27c65c5006169f77d575dff7053d81d8a42d943d81
SHA5129e16670974d74c0f3a69bce58cd75b1ebae0195be5ed9e340c6f810931a95c7b2ec899272a93846cc5854176e0d4949461954b46261de5b17bac33c187687ee9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd