Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
279s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2023, 10:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ego-mediaservice.us3.list-manage.com/track/click?u=b797c6b5a97f5c97fb378a80f&id=0eebfed7ee&e=d8f9695846
Resource
win10v2004-20230220-en
General
-
Target
https://ego-mediaservice.us3.list-manage.com/track/click?u=b797c6b5a97f5c97fb378a80f&id=0eebfed7ee&e=d8f9695846
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133268120321723447" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 1016 chrome.exe 1016 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4380 wrote to memory of 4552 4380 chrome.exe 84 PID 4380 wrote to memory of 4552 4380 chrome.exe 84 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 1472 4380 chrome.exe 85 PID 4380 wrote to memory of 4940 4380 chrome.exe 86 PID 4380 wrote to memory of 4940 4380 chrome.exe 86 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87 PID 4380 wrote to memory of 3476 4380 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://ego-mediaservice.us3.list-manage.com/track/click?u=b797c6b5a97f5c97fb378a80f&id=0eebfed7ee&e=d8f96958461⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc38c69758,0x7ffc38c69768,0x7ffc38c697782⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 --field-trial-handle=1832,i,7881135748119223320,18359291503115872981,131072 /prefetch:22⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1832,i,7881135748119223320,18359291503115872981,131072 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1832,i,7881135748119223320,18359291503115872981,131072 /prefetch:82⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3160 --field-trial-handle=1832,i,7881135748119223320,18359291503115872981,131072 /prefetch:12⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1832,i,7881135748119223320,18359291503115872981,131072 /prefetch:12⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4532 --field-trial-handle=1832,i,7881135748119223320,18359291503115872981,131072 /prefetch:12⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3176 --field-trial-handle=1832,i,7881135748119223320,18359291503115872981,131072 /prefetch:12⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 --field-trial-handle=1832,i,7881135748119223320,18359291503115872981,131072 /prefetch:82⤵PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5452 --field-trial-handle=1832,i,7881135748119223320,18359291503115872981,131072 /prefetch:82⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 --field-trial-handle=1832,i,7881135748119223320,18359291503115872981,131072 /prefetch:82⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3780 --field-trial-handle=1832,i,7881135748119223320,18359291503115872981,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3924
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD508dcee1f337dbdc4ee9436901d8b5373
SHA18df95d421e2e9d74cec78abf8364445c337594ab
SHA25651a2dc34e660cfd4d9759ddc8518b461769d23e7a1a3ea1b7dcc0edcf06c2c87
SHA51285ebfdbe24856b11cd3327f2e48d4e80e3bcfdf4f19d1fe8bce7d713115f4ccad06c079f81654d33acabfd7a277bc534192484504311b1a33769d4f3a8c04d8f
-
Filesize
163KB
MD5109e1354dcad59ff8d3e589dcc09299a
SHA1bc2cf564c7967a59936c2074b78e124e17439c3a
SHA256a9f34a49984f7a94c7a522a6d171e470701d34a4b630dcb7ae673e6cfaf2e5ae
SHA5124a85f37ac35db60a44e729a0ee842e45172657c17c71022dfa73aed445106b833cdceccf94b1735737d5b9c06da8db19a6799186bbf742544c943a4b8de737ce
-
Filesize
264B
MD5c75e008e989c8063e5a25ee4cc60d9fc
SHA176ab42d12a90c1686130bebcabb7b2b34ee36664
SHA2563cfacc85d42b4a0d61ed65840f4dc10756e8b62fe4ca27bc1ba9f4efcc7b509b
SHA5120e7348fb8d81bf8b5f70514102ab308eab8138cae1134553d8a47ae7ed3c8add8d7f72d0096a34630438e9b595d54b1ed4e6ea4341a670c19c1c8686e1fdb5c6
-
Filesize
2KB
MD58b7180585f5a732c793728cd39604ec4
SHA1109797f0bdbbcec569db82980fbb491325c32f8d
SHA256645c0bff5c5cb714db8eaccb817e0cb968047b1cd566ee65a89c725a1853d09f
SHA5125aa52803c59d89e9f872c7f503ac7ec70569d5620c0cf209a71145bfbe48d4f4ae2e7bf7c836c019779216bf45934ddf6c4cf39f71cfc22db8125d4a6e94152a
-
Filesize
1KB
MD5ec84fa53a93adf4758a13d47ae99e06b
SHA12fe6f01a8baea5455ccf605330f8f3dc561e8b48
SHA2567fee7defed52e09435fd698278e5207236c71b89a4c1539d9e8b73421acb3e0b
SHA51210ab00e31654e78188e00057f4ef2f3e0e54afe552cf97039111eba54aacdacc6664f8f545a9c035e9a6718105f76176c3dfed707e879221bc36f3e9eba328a0
-
Filesize
6KB
MD5a746f94d3074e1000dae42406d67a609
SHA10f16534f205d5371e53d0554af938f20b84ba5f6
SHA256c52e36d167c46227e268aaaf1714a0875a5b22daaf57ef7ab58eb7c316245209
SHA512097d28b11a4770853168bd5b4520bf75f00806e863831b54475978e29d3b632002bb75fd310a35aac953752438ef047a5386999dd06b6ecd35aa7f7f1afd4a4e
-
Filesize
15KB
MD5e8ce1be992b20b783416c133e67b3cfe
SHA142c82de3d20a1d2e0c6457d861c2c2838887368f
SHA256cebf3cd941621da4bc740db2ed75d54247f2d3902b778d0860f7a6502ab37e79
SHA512902b061c409480413644a6e66c1b46345d41f8e65d1e095eab865b8c3ffeb42d5cc49880fa0c2ad61b0430dc71c6bf46922c28a82c250e5d809b70d42737d2ca
-
Filesize
201KB
MD510abc573b4c335118f33d45a1c1050ce
SHA1bf7eb590c4dc0f3c206a098f424ef64aa6e97244
SHA256ee6134aaaf6e6cab296d330e63f42549df2c83f1debcfcd3d1ab3dfb7ae113cc
SHA512b39669c3fe14b2b2813812a68595c13deb8fa4b509c4f7097cdf25840ff34853d2b8a7b9875e3ba50392edd58e99d59be6aed2eaeaf2edfb083197059f2f477d
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd