Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 07:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tracking.offshore-energy.biz/hydrogen/?utm_source=offshoreenergytoday&utm_medium=email&utm_campaign=newsletter_2024-06-13&cctw=AQIECBCAAQFNNRO-g8bMjnIy5Ko
Resource
win10v2004-20240508-en
General
-
Target
https://tracking.offshore-energy.biz/hydrogen/?utm_source=offshoreenergytoday&utm_medium=email&utm_campaign=newsletter_2024-06-13&cctw=AQIECBCAAQFNNRO-g8bMjnIy5Ko
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133627389338519864" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1936 chrome.exe 1936 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe Token: SeShutdownPrivilege 1240 chrome.exe Token: SeCreatePagefilePrivilege 1240 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe 1240 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1240 wrote to memory of 3768 1240 chrome.exe 82 PID 1240 wrote to memory of 3768 1240 chrome.exe 82 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 1292 1240 chrome.exe 85 PID 1240 wrote to memory of 3004 1240 chrome.exe 86 PID 1240 wrote to memory of 3004 1240 chrome.exe 86 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87 PID 1240 wrote to memory of 2624 1240 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://tracking.offshore-energy.biz/hydrogen/?utm_source=offshoreenergytoday&utm_medium=email&utm_campaign=newsletter_2024-06-13&cctw=AQIECBCAAQFNNRO-g8bMjnIy5Ko1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a8abab58,0x7ff9a8abab68,0x7ff9a8abab782⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1936,i,11791606275456682388,15583215747898762820,131072 /prefetch:22⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1936,i,11791606275456682388,15583215747898762820,131072 /prefetch:82⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1684 --field-trial-handle=1936,i,11791606275456682388,15583215747898762820,131072 /prefetch:82⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1936,i,11791606275456682388,15583215747898762820,131072 /prefetch:12⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1936,i,11791606275456682388,15583215747898762820,131072 /prefetch:12⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4660 --field-trial-handle=1936,i,11791606275456682388,15583215747898762820,131072 /prefetch:82⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4120 --field-trial-handle=1936,i,11791606275456682388,15583215747898762820,131072 /prefetch:82⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5112 --field-trial-handle=1936,i,11791606275456682388,15583215747898762820,131072 /prefetch:12⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3304 --field-trial-handle=1936,i,11791606275456682388,15583215747898762820,131072 /prefetch:12⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3964 --field-trial-handle=1936,i,11791606275456682388,15583215747898762820,131072 /prefetch:82⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 --field-trial-handle=1936,i,11791606275456682388,15583215747898762820,131072 /prefetch:82⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4200 --field-trial-handle=1936,i,11791606275456682388,15583215747898762820,131072 /prefetch:82⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3256 --field-trial-handle=1936,i,11791606275456682388,15583215747898762820,131072 /prefetch:12⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1544 --field-trial-handle=1936,i,11791606275456682388,15583215747898762820,131072 /prefetch:12⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5068 --field-trial-handle=1936,i,11791606275456682388,15583215747898762820,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4880 --field-trial-handle=1936,i,11791606275456682388,15583215747898762820,131072 /prefetch:12⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD513252ea471e944c9106326b74c6415d0
SHA10729d4ef13d66fe137fa09416dace07857e0e706
SHA25656d914371861522ef613237d98057bc6b3f40ad8dc7293f2ec5c9418225bf6ee
SHA5123a8e28fc1bc8369d477e8df14332745236aafbd24a2cf4c32b7e1f6ef241759af571fe3f6be00f9130d3ac17acaa0a4b810563b68b87f4a7fa8bb6668116e7cc
-
Filesize
257KB
MD5e70aa74f3b44982c3568334521c90910
SHA1ec27edca9c2a7e69ae895dda6f640d89b7c604a9
SHA25622f40e3b5a73542020198529eb7b57897b68edef952ed2126dfea39acda4eb31
SHA5126172c41ffbaab7061b86a65424e33b11385393283e7b4dc8464734e31c7d4b4435f297470b576a83b6ff5a8f069fd1b9d47611a1b5661ff5fc2a1bbbef0bc343
-
Filesize
257KB
MD5db22d745ee37445324a9c9cce117eef8
SHA1f1a9f8b29ccd1a3c586cd24503682ff44dee12f3
SHA256d75b5dfd07676d050d9d6746c856df3ebbebd59c1dd2d89e77a777520c368e6d
SHA512f0c6fd9e2654e9ee09f20e8096bb0601fdf29eaa9775c9a831f6adddd37c72177bf28279e3a7d94fab56ca594f8a849cc216892ce16fa1ca024e895c0c843d2c
-
Filesize
91KB
MD5314155809aa43dfa947a028d194f11a0
SHA162044462824aad9bf28835741331a69df56fde83
SHA256a403d5f70df6a3940b1b2deb0a5de4265155c022a0da4388eae732d5199595ae
SHA5123e25393910bd75561a9dc660f83339b95040c9e2916c194162f7d40e5cee7274983e3754caba64eeb53920feffd7eafdfffd97e69c50cd769e74de80aa36f221
-
Filesize
88KB
MD5c240520a8ad331a1e73c82ef77917ba6
SHA1016a38bff4885ee40aa5c210d58d7f1736561f15
SHA2560330451741a5fb0f02f587434981fec29b7b4fd8a9f0028f944811fea87745f1
SHA51226cf95ac1b8f6ec99b9a88a5cba6fd40dbac8ad6328e3f6ed1ab1caa75251ed59339c87d8311d1b8bb33e661ad862d0129209e11962169974a5a0bc677206b04