Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
12/07/2023, 06:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://salesforce.com
Resource
win10-20230703-en
General
-
Target
http://salesforce.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133336184722741590" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4120 chrome.exe 4120 chrome.exe 4788 chrome.exe 4788 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe Token: SeShutdownPrivilege 4120 chrome.exe Token: SeCreatePagefilePrivilege 4120 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe 4120 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4120 wrote to memory of 4308 4120 chrome.exe 69 PID 4120 wrote to memory of 4308 4120 chrome.exe 69 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 3904 4120 chrome.exe 72 PID 4120 wrote to memory of 2764 4120 chrome.exe 71 PID 4120 wrote to memory of 2764 4120 chrome.exe 71 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73 PID 4120 wrote to memory of 4216 4120 chrome.exe 73
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://salesforce.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8ffcd9758,0x7ff8ffcd9768,0x7ff8ffcd97782⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1800 --field-trial-handle=1812,i,8635274795557415046,5528681526586877685,131072 /prefetch:82⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1812,i,8635274795557415046,5528681526586877685,131072 /prefetch:22⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1812,i,8635274795557415046,5528681526586877685,131072 /prefetch:82⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2872 --field-trial-handle=1812,i,8635274795557415046,5528681526586877685,131072 /prefetch:12⤵PID:696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2736 --field-trial-handle=1812,i,8635274795557415046,5528681526586877685,131072 /prefetch:12⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4336 --field-trial-handle=1812,i,8635274795557415046,5528681526586877685,131072 /prefetch:12⤵PID:3144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4756 --field-trial-handle=1812,i,8635274795557415046,5528681526586877685,131072 /prefetch:12⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2932 --field-trial-handle=1812,i,8635274795557415046,5528681526586877685,131072 /prefetch:12⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5220 --field-trial-handle=1812,i,8635274795557415046,5528681526586877685,131072 /prefetch:12⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 --field-trial-handle=1812,i,8635274795557415046,5528681526586877685,131072 /prefetch:82⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5948 --field-trial-handle=1812,i,8635274795557415046,5528681526586877685,131072 /prefetch:82⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 --field-trial-handle=1812,i,8635274795557415046,5528681526586877685,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD5239a141839dfe13bcc11b220f3096efb
SHA1b47830fcb2af33924fdd4ffc6de2c681bf5777f2
SHA256ae68637dadd25e8df4d6d571270a9ef944605f2b276834c33abcb391a073a019
SHA5129125ff4e3164d84db66cf8bb9978d022d385601bae41a6b444b3c081660731822b07b4cd860e01b08ebdb0728cc6e97deaa63969483df29a098a88e5f9c6021e
-
Filesize
1KB
MD5fff3cd5c565a0edc18237815e1639520
SHA1e218d1949eb8b030a31e06215bd9cd4b1083031a
SHA256dcd2cf305d6eb71ee72c8d9a6576336b85048ffb5d46dddf84fa368421cfc7b9
SHA5125d9a189f528aa324079207097531b78ff9281e4de683bf52fd77b0efb2e673ab11206d8860580eb52641dcb13cf9b5f29084ea4f13969f1b62411e3e00da8406
-
Filesize
1KB
MD551051e2399ca4481908c619c081e3c83
SHA1f48e82fc4677b48aac91eeb54b9c4ea3260cd8a8
SHA25650ffe7d60c8f30336964761eff2af4c53defcde2ec372281e4781dae55029bd7
SHA512e54e4714432c4d301431c460194cd328daa9e11df9b955f4bb5b19ef1cb8ac04e43bdabf62ba9b174002991a2c320e3e3c8efb28c18e15bba7d69d1aaac347b6
-
Filesize
4KB
MD5a270e909dd04902eaaa0205582211fb1
SHA14b6d4b54daf57dd043fd1c1b758e3cb436930d3f
SHA256812719bcd0e43f662e4f4ca6f6b2b37ab564b1d65b3badb36cc413a687977b99
SHA512d8feaa5d29b2184a70bfbebfa780c8d247bf4d3e4ee548c7ba07a826f885979c46125c5bb206de9c6ae493b8fb8faadf556e43739288edbeefa956c13a6ed65b
-
Filesize
3KB
MD5545966d56066d2e71b255a445ea91033
SHA1fd0773ce4213a329fc70911d31b441c3ba0a571b
SHA25639e0b0133e54c593f730f26732869bf1e846b8a52af0e24a20f98f462700d016
SHA51219b59d978c14372dbaeb2fe056cedd7acbcf20720b8f6feca7469b5e9638cbff46834f0434c8af70dc00de0cad3cb8d34cc4da7c356b7bc6194d0b4144e9a8a3
-
Filesize
3KB
MD5d71e3b7f7c6dc6ece71c12c21df8df8f
SHA1489ceda5d9847f4921988663e75cd01b451e282b
SHA256bfc0ebafaffa42f0e169b5efe840d254a674ba7a1e91f114ba7cf0609791c19a
SHA512867207790eb305fc2713c8fa9ad400165fe7233f0fc580bb48587c77b78280d30b521eed8e40f58d9a897bd1e40cec53df318178e94708fa8f8247fd6ab41c0f
-
Filesize
5KB
MD563a7fe419a0aab72e579c9b7f2c48fba
SHA1682bc46763248edf4fc8403fb9bae798487c9f36
SHA256ab5684e172b0381df4f938cdc646bf05a217b8070296d6bda5b77a513813166f
SHA5124a751dc64022da6647bd5aa4ea877818d86d9484fa2ecb50dff98a9b3493402cb366f1095d2e1e55bc96afd6339e86de242fdf794f3ea43ae244ad96d51f85dc
-
Filesize
6KB
MD5fdcaf5a956525385aa76190a76d57498
SHA1e15d428875e8c74e7286e50901681af112d0675a
SHA25625aba913ec13cc69742ed80fdc9a4fef02b50802195e9cf0e354aceb47918e8d
SHA512a305a5abd121e4bebe98baf4c0d16802296c59bcd0966386ac6ae4ebc486d81c16eedde39382c962dc742e4c3fe400ff3e8d4d9911b6180b78b57c91c2bf6364
-
Filesize
5KB
MD5d77a1550c2f45811595c0e8017be8c02
SHA1381d338835bfcecef4a0564903e1638c2da622d6
SHA256ea3a2b2559c701b1ce0288fe4ec8b1c07e29986651d6a93932b521d7ece7dde7
SHA5129e771067591dc28d8fd48afee0219b81b7f29688cb9734698a619df27f4d5b28f81e3c2ac185455a5862a9b7ca2fa8e9371026e56b71ed7f0317064dd1bba9b9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd