Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 10:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://services.promo.ai/mail/click/s57c2c09e921e4a48ae148b51ffe3f469/subfd22893d15204bafa366a776887d6008/l305add2e016448d9ab51456f0d18f062
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
https://services.promo.ai/mail/click/s57c2c09e921e4a48ae148b51ffe3f469/subfd22893d15204bafa366a776887d6008/l305add2e016448d9ab51456f0d18f062
Resource
win11-20240508-en
General
-
Target
https://services.promo.ai/mail/click/s57c2c09e921e4a48ae148b51ffe3f469/subfd22893d15204bafa366a776887d6008/l305add2e016448d9ab51456f0d18f062
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133643041937055233" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 2108 chrome.exe 2108 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 712 wrote to memory of 992 712 chrome.exe 81 PID 712 wrote to memory of 992 712 chrome.exe 81 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 3980 712 chrome.exe 82 PID 712 wrote to memory of 964 712 chrome.exe 83 PID 712 wrote to memory of 964 712 chrome.exe 83 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84 PID 712 wrote to memory of 4496 712 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://services.promo.ai/mail/click/s57c2c09e921e4a48ae148b51ffe3f469/subfd22893d15204bafa366a776887d6008/l305add2e016448d9ab51456f0d18f0621⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ad38ab58,0x7ff8ad38ab68,0x7ff8ad38ab782⤵PID:992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1892,i,5185124095002192906,4262253334658244408,131072 /prefetch:22⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1892,i,5185124095002192906,4262253334658244408,131072 /prefetch:82⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2188 --field-trial-handle=1892,i,5185124095002192906,4262253334658244408,131072 /prefetch:82⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2916 --field-trial-handle=1892,i,5185124095002192906,4262253334658244408,131072 /prefetch:12⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1892,i,5185124095002192906,4262253334658244408,131072 /prefetch:12⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4296 --field-trial-handle=1892,i,5185124095002192906,4262253334658244408,131072 /prefetch:82⤵PID:4648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4464 --field-trial-handle=1892,i,5185124095002192906,4262253334658244408,131072 /prefetch:82⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3500 --field-trial-handle=1892,i,5185124095002192906,4262253334658244408,131072 /prefetch:12⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4416 --field-trial-handle=1892,i,5185124095002192906,4262253334658244408,131072 /prefetch:12⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3968 --field-trial-handle=1892,i,5185124095002192906,4262253334658244408,131072 /prefetch:82⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4668 --field-trial-handle=1892,i,5185124095002192906,4262253334658244408,131072 /prefetch:82⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 --field-trial-handle=1892,i,5185124095002192906,4262253334658244408,131072 /prefetch:82⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4616 --field-trial-handle=1892,i,5185124095002192906,4262253334658244408,131072 /prefetch:12⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1608 --field-trial-handle=1892,i,5185124095002192906,4262253334658244408,131072 /prefetch:12⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3336 --field-trial-handle=1892,i,5185124095002192906,4262253334658244408,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2664 --field-trial-handle=1892,i,5185124095002192906,4262253334658244408,131072 /prefetch:12⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5686f988912b250718ae6df375123573b
SHA1461cd13ce1e7ad6eb3dae3991f9a317aa28cba0d
SHA2569a9d391e8b758a07d4a20b81927b17d0de505a1083e2045b6168b209690af9d9
SHA51211d21064be2b333ce619ba6ade1055650d00258e0819202b53f3793b817c3659df5045e3bdfba6777fb99beeedc75ed2ee0a612db114b5d9b21ea2454477b1f6
-
Filesize
7KB
MD589590ae87fdc89fce22878ba5d22b355
SHA17fd8fa582a64c590a7a0d8b34d09360dc6bef0b3
SHA2561b3ca56a58b7741e7d0fbce40133203eb248a38ec3b38b06a627dbfd742f39ce
SHA51277595285be563200bda781554e6491fa423549dc5499a1bf53f7ff3b6dc71c0572a334d11f4e5752c764b1a4b9644d75d731f266adad9346abba172ac4384914
-
Filesize
257KB
MD540cbbe4f0f68ebf0397abef19e9e7ea1
SHA1c66eb0184e7c17721beeb702a9d7c983c8b76c88
SHA256df69de2d192cd052ec0b23a336024e242ea4333e94c602f7c11730de952c965f
SHA51219760c5a60769985c8cdf8820019f359c8f59ee469e2b0a06484c09a5f863ee929f9774d39147352477cbc2f397ded9a18b892a42f9f4881ce391f278c25e5bc
-
Filesize
91KB
MD5ed248f3c6c4c8cbd9131f0c3939a9fdb
SHA1b3ba4741c90894c424324bfb934730db9a1def85
SHA256ec31c6b80a29a16522b3f440e314ed90d8c85bd4e81cf4eae06ba34c4d755ce2
SHA512c6711bf3ab1292ae3c91fc65c3ede5b279aedd81cc3265882da03a68ab00b52cf37f3cdfb6473cd9112415f919bd5fc221efb6c8f82963fea03f4d1dccd12818
-
Filesize
88KB
MD53dd602f86704e718705a683fc83abde4
SHA15b10330eac9e5f4c513ead4111558491a806df06
SHA25671d9447213978d94e0cbbd53e285726a13c95ce5c99c9f00cd974870513484ef
SHA512d1ebcd8c7fa077bde9fba9f8c6339437d8057ffe7cd17087d95c449c333e943c9d3f0a74fe5ccac6c047eee8453926e4dc68c5b7d6059d0cfb8d2e8a6c27c6dc
-
Filesize
257KB
MD53ee0bcddcde540af7fd86d5fb75ed9b4
SHA1d19e90318642c905a056e42bdf20063660625ff4
SHA256bd12bb0c2bd5bb5eda52d269f3b49358b3654e98ad1c603ec48af5c31e41cb46
SHA51262123dd40bb51feb7f093b8c957c839e7cc585a2f4ec7823add0228ed8219a1d2486ccb233ef9ec53b728ce6f04f49275045e27c1ffaf0167f7a70cb21408053