Analysis
-
max time kernel
300s -
max time network
295s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
29/05/2023, 21:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bzjospk.cn/DjIxqb0W/brouuy/?_t=1682816660813
Resource
win10-20230220-en
General
-
Target
https://bzjospk.cn/DjIxqb0W/brouuy/?_t=1682816660813
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133298761416305730" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 2136 chrome.exe 2136 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe Token: SeShutdownPrivilege 8 chrome.exe Token: SeCreatePagefilePrivilege 8 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe 8 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 8 wrote to memory of 3240 8 chrome.exe 66 PID 8 wrote to memory of 3240 8 chrome.exe 66 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 4000 8 chrome.exe 69 PID 8 wrote to memory of 3908 8 chrome.exe 68 PID 8 wrote to memory of 3908 8 chrome.exe 68 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70 PID 8 wrote to memory of 4744 8 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://bzjospk.cn/DjIxqb0W/brouuy/?_t=16828166608131⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd52f59758,0x7ffd52f59768,0x7ffd52f597782⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1884 --field-trial-handle=1816,i,7369392169586232833,17976940858068952120,131072 /prefetch:82⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1816,i,7369392169586232833,17976940858068952120,131072 /prefetch:22⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1996 --field-trial-handle=1816,i,7369392169586232833,17976940858068952120,131072 /prefetch:82⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2988 --field-trial-handle=1816,i,7369392169586232833,17976940858068952120,131072 /prefetch:12⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1816,i,7369392169586232833,17976940858068952120,131072 /prefetch:12⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4388 --field-trial-handle=1816,i,7369392169586232833,17976940858068952120,131072 /prefetch:12⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4400 --field-trial-handle=1816,i,7369392169586232833,17976940858068952120,131072 /prefetch:12⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 --field-trial-handle=1816,i,7369392169586232833,17976940858068952120,131072 /prefetch:82⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 --field-trial-handle=1816,i,7369392169586232833,17976940858068952120,131072 /prefetch:82⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1816,i,7369392169586232833,17976940858068952120,131072 /prefetch:82⤵PID:780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 --field-trial-handle=1816,i,7369392169586232833,17976940858068952120,131072 /prefetch:82⤵PID:788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5072 --field-trial-handle=1816,i,7369392169586232833,17976940858068952120,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1812
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD53eb39c87a43f61c580dd74378dbf68f7
SHA1f0a0669da1466da2cf596145769503d0ef390abb
SHA256980cf50931bc8fb053f78314558728bfef2c82e77d0443da9f29be74123eba07
SHA512852561cf039ceb46b3635e8561443dac945fb6afe7cd02cc0310e01e0dbb66a038b162a534ce3077023d4bb5948530cc7e68493469f782be3f4e5e8b8d84de06
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\4f5a111a-eb60-4539-97a7-cbb55d66cea6.tmp
Filesize2KB
MD5f7190c2fa4e180db9a0c3d8b91376aa0
SHA1b93572f3a090315fad61a5fcbd51a8d114cdc6cd
SHA256cb0f56f0a53877487f2f563a42d744be5a5eef162074bbf32214d0fb6d65a96c
SHA512a6d594c5ae0fafa46addc6da1fcdddde9f1e9ff6b087e639ac0f53a73248a7d2c6124185a90e9de6680ad059cf941249a5da01327cc88e36b2787ccfb1ba5550
-
Filesize
2KB
MD59f03fc75ecdf386bf9e19acec58ec11a
SHA1fca43ddc17592a4dbabd965bb4cd8c9934836440
SHA25607456d04ab3e6ae189c582c5ac61605b9b71079d23c5f56277fb38f3718ef183
SHA5129f86fde7fb7f7ebcff56a3ad6ca78aa92b377cf5ea3b3628513aca6830af7c32008cfac3a2d767e7c7a81315a3b7577e30f350dbfd336f31386585730f165f48
-
Filesize
2KB
MD5e0ed123f4b2d69dec68a1817ebd4a647
SHA165419e6166aba3f79e107352b7fdb5bf3dc253f7
SHA256d9ef8d19618493fd9a9eab489e2b6e0b35aefd9e4071f89b0281c80ace47ee17
SHA51281ad4bd8772c85df4c6420728432ce45f3689f99ae42e99257da2bba0540b2bb6b08eb339ce685acac3ea7c3c07e1b873c81a4648877d0f44c94846c02a6d50e
-
Filesize
707B
MD5741baba11b5db61fcea68435946d3355
SHA192572914b5f9034e7b2f1a47873bf3a1d355e879
SHA256927d666377415ab68b1b6648ed55e1b20b621caaf7ddf294b0230151389269d8
SHA512ade882603f738000168023628e85687a696bb508dd47a8e46f7bceb3da7b5fea2a2b8d498a4cfe8dc81844105ebb36b12707fdbd6b27dac5b2a2cb66aae7d9d5
-
Filesize
6KB
MD56662c02715c5bdd574243fe6eb1713dd
SHA1a59c70411d073af068882a69aa4db86866107857
SHA25677a7fca526cc8d578bad7daf8b4c93341bee02af01b6b1093e381882f1cced2b
SHA512daff9258da82d9c0f249455198f90c33659f85f39c0932bbeddf761f40bcdd8b68dd02d7eaa760bbf48ac2b4aae6511fac38a7101e4bb6b746cd90853b9b6e63
-
Filesize
156KB
MD503e04195bd07c54821c0dffae2103d3a
SHA1f84f9c470d0e15da8e5493c264c55f79c936d54d
SHA256ab59c84d4d09eef57e601eadfd0c999922e68a39555eaa149b44cc0d4ccef2bd
SHA512b54d1d301345c14e643a0c6de567107a77c96e90a08d942b063c73a9ebec22daef339792c54c2ff72eb48358474bdbe0d2a5b304d71cc0e8aaf1043c0757eecd
-
Filesize
156KB
MD508507ed54af004e86d70575042a390b0
SHA1d0d95db3fd0df67ace72583858d1f275c04d5270
SHA2562ed5acb69111999cbef7ac5d58a9240a12592d49da9d48793501bc1e748bca4a
SHA51229b74f8420801355e15d3c22e656c0cb430666199c6bffee16700e5144f6038cb2e6b6a69407aacc89233bb068e591bb12bd440bb8c87d4a2ed4c76a9f9e3e45
-
Filesize
156KB
MD51aceb1b6a7dbea3e1416faa32c610b98
SHA1569fa99c75caa9f7ca4747ee5af41c3f7a57bc1f
SHA2564e41c4763876aed6ad0ba81123958ed745ed2f9159f386517f22b1b12d24d170
SHA5121cb53f1ac672e8e7c98d373b6dcc26b46a9ebb0457cd992eb984862b1023828d36921d3d7b97119e9855876d495d08095e1b0baa644cccacc00d57ef8f38696f
-
Filesize
72KB
MD5a2dc68e25fb3afa212474f7ca2381734
SHA1ea2c1088e45a091e9edde3bdd50a74e8dd1897df
SHA2569f98374625bfb960ba1ea4cf93e62f88d00175aefb3107f9f7873921eaefab1e
SHA512cbefb1ae4628baa21acf667aa5f0149e88a519a84da31ff7c26dc92812c7535a8f641028a1f339fc21d494dbe9bfd2ae6be94a5d20a5fb26a0cad292c69826f2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd