Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
600s -
max time network
490s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2023, 14:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://3.120.23.21:443
Resource
win10v2004-20230915-en
General
-
Target
http://3.120.23.21:443
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133408187308169078" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3888 chrome.exe 3888 chrome.exe 2604 chrome.exe 2604 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3888 wrote to memory of 4540 3888 chrome.exe 36 PID 3888 wrote to memory of 4540 3888 chrome.exe 36 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 4844 3888 chrome.exe 87 PID 3888 wrote to memory of 412 3888 chrome.exe 89 PID 3888 wrote to memory of 412 3888 chrome.exe 89 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88 PID 3888 wrote to memory of 2852 3888 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://3.120.23.21:4431⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x80,0x108,0x7ffca45a9758,0x7ffca45a9768,0x7ffca45a97782⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1872,i,14110230218282559056,12092208383199346658,131072 /prefetch:22⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1872,i,14110230218282559056,12092208383199346658,131072 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1872,i,14110230218282559056,12092208383199346658,131072 /prefetch:82⤵PID:412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2836 --field-trial-handle=1872,i,14110230218282559056,12092208383199346658,131072 /prefetch:12⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2816 --field-trial-handle=1872,i,14110230218282559056,12092208383199346658,131072 /prefetch:12⤵PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3888 --field-trial-handle=1872,i,14110230218282559056,12092208383199346658,131072 /prefetch:12⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3060 --field-trial-handle=1872,i,14110230218282559056,12092208383199346658,131072 /prefetch:12⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 --field-trial-handle=1872,i,14110230218282559056,12092208383199346658,131072 /prefetch:82⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1872,i,14110230218282559056,12092208383199346658,131072 /prefetch:82⤵PID:3292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=1624 --field-trial-handle=1872,i,14110230218282559056,12092208383199346658,131072 /prefetch:12⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5028 --field-trial-handle=1872,i,14110230218282559056,12092208383199346658,131072 /prefetch:12⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2844 --field-trial-handle=1872,i,14110230218282559056,12092208383199346658,131072 /prefetch:82⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4028 --field-trial-handle=1872,i,14110230218282559056,12092208383199346658,131072 /prefetch:12⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2676 --field-trial-handle=1872,i,14110230218282559056,12092208383199346658,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54811367b6b0a619b1ef33d7593c9cb18
SHA1283dd6fa5f6b7b5dd2d0787508445ad17def9035
SHA2569813db6b5e4e797c25f61ed6da70503aa852f96d01c8f86bd313117089f634b3
SHA51233f788be7eaf20c4c36c2d65ab73194282c166862772eb326405e643a9f70aa1689a3e0a955e2eb3a6ddab0e091460ad983abca67ce1e728183d95b6f92c6b24
-
Filesize
1KB
MD5fd1160eb6216e4aada50431dd8e6036c
SHA1377c8c2e7efc2ebaf54a04566d9c9d32fb8ee953
SHA256cbdbff81baba75902a2c0eb0d8f170013e6606b027b9fa51a19e2b7c5c3d7d00
SHA512658731a63327fbf6470b800b4b7535f60757b659619d8d496c716974ef6a16e9b6ae0b191780140d171035f52129a83e0bc6f40969168cf27b9c6d13727ca0d1
-
Filesize
6KB
MD5e393e15587cf575878ca41a585c3a8ed
SHA18d022a753ff758f8185bc8069aa0eb1ae216c230
SHA2563328b65db166cd25bb8661a1b577314741ca530c0436382f4733baa88d921942
SHA5120599a8e0d704f8ce94c136df854d49bf4b8debd6af4540381c0339b17f55365cd729e5cb3b513c2568e14587acdfafd7e052b6f944affd164e069c1e57aed6f8
-
Filesize
6KB
MD5ab1cdba408ffbd46d74f0b7085fe0b27
SHA1ed87fc7f1cdbe9c93c246f6f8d64452443f18909
SHA256f721f829792ecb7d642d52c3d59e9dbe5e2950b8865829b33045a07bfdd02942
SHA51245e0d2b9fef3481c43f2b26842e387538eeb3c4034d25f327f232a404c5680314302ee165eacaf01249d8389c0a417dd384f606b1ee9d11f4bc3c5b204343d69
-
Filesize
101KB
MD5a8245d6358062edf13979f5dc144149a
SHA16b534d304a5961a66eca05eee5b93c5bfd93cf84
SHA2566f54ab3ab5f2647fed5bf3cdb9cdfc27d42dbe8087f7b5554db678ece12bd3b1
SHA5123d9e7fd3768ea556f4254c215e9d75db72a103ef616128296e8bd3d01eb82c9f70bded69a0c114a23c8f39348ed6dac4d6ee6fc277fdc3de6e4da55dc9509be6
-
Filesize
103KB
MD5fae83b3066e11d430347829f2d674887
SHA1ae0256e09256ee18233c63e832de2e083487b665
SHA256914437cbbb1a09240798c6aaf9c49cb51ade43ea6ce03707ff08e372578a76f4
SHA512ec9aecc50c4358cb331a202f5d97b639d8c90eabb4dff6faa6560b9fdac5b26c30252c41612459c4ebcc4077bf30f477ac1db466aae72dcbafa6fe7922522a2f
-
Filesize
97KB
MD5d74c1718ffb1e68b91939a67e8550eed
SHA16645457522a96f6a6465d9011760fe48ba96eaa7
SHA2562cbba4c346e65b9c65cc3227bc68c4ecea0934b24cb91476957691f83f17166e
SHA512730d8c4762b8537db917721de4567730d0e1a40a4cde88d341cbba8c173e8186a1133d4cdc5a0489f61eb12f8946fb4eaff08dc7ce17e1c1be3f564ec34719ab
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd