Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2024, 23:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ycardozave.wixsite.com/ttec
Resource
win10v2004-20231215-en
General
-
Target
http://ycardozave.wixsite.com/ttec
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133487105186829208" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3712 chrome.exe 3712 chrome.exe 1416 chrome.exe 1416 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe Token: SeShutdownPrivilege 3712 chrome.exe Token: SeCreatePagefilePrivilege 3712 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe 3712 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3712 wrote to memory of 4224 3712 chrome.exe 89 PID 3712 wrote to memory of 4224 3712 chrome.exe 89 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 3740 3712 chrome.exe 92 PID 3712 wrote to memory of 5100 3712 chrome.exe 93 PID 3712 wrote to memory of 5100 3712 chrome.exe 93 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94 PID 3712 wrote to memory of 4656 3712 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ycardozave.wixsite.com/ttec1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c2979758,0x7ff8c2979768,0x7ff8c29797782⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 --field-trial-handle=1888,i,409975340771168860,4466717360159009382,131072 /prefetch:22⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1888,i,409975340771168860,4466717360159009382,131072 /prefetch:82⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1888,i,409975340771168860,4466717360159009382,131072 /prefetch:82⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1888,i,409975340771168860,4466717360159009382,131072 /prefetch:12⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1888,i,409975340771168860,4466717360159009382,131072 /prefetch:12⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4716 --field-trial-handle=1888,i,409975340771168860,4466717360159009382,131072 /prefetch:12⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5080 --field-trial-handle=1888,i,409975340771168860,4466717360159009382,131072 /prefetch:12⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 --field-trial-handle=1888,i,409975340771168860,4466717360159009382,131072 /prefetch:82⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 --field-trial-handle=1888,i,409975340771168860,4466717360159009382,131072 /prefetch:82⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4552 --field-trial-handle=1888,i,409975340771168860,4466717360159009382,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5aaf97953cbf0e4fe96988f53219c4d92
SHA1878393769696d51dfabd0b8433237ccc4aa1c577
SHA256b6ac31d7fcf7806c8ac01bcb96002cd48a2c213417e486dbc02690e9747cf559
SHA512925e291162a2c94b704a4094ab595e608cbf0a3a123e53ee34f7700a27d883e41b9fca85396d460277a8dbc7ea5dce290268e590f3683c7d1395fe33cc4e8245
-
Filesize
1KB
MD5e42c038eca2e30da2c942712dd5fc4f1
SHA1b148ae9bc703cdb39b0128b2e467e9e2f66181f2
SHA2569cd630996f84b18bb45814756d005ea6f4bf07acf2534b37ec73a4767ed0cafc
SHA512336dc30aa5412756ed8d353c4960764b3d9842608ea3aacbe24882460420395a05d447e43fe3d9809e143f046aed8b9f69cc76035d89dd19c85724e812f45cef
-
Filesize
1KB
MD58009999f23634133fbc5b99f0cb68bc8
SHA1a1681531b36d99d54f0d7812315f7cf91eaa08d4
SHA256894b8bd13e706876cee82007f0cdc37f3ce872f50b01489e9a698c5602757795
SHA512deb2261a68be8985212aed3a05b5f246c6d2fc066140062879f5f43aff76576688c090910cc58f4f32344e1013d3ac303c2cccd04868d59d865aff743d5e9b2d
-
Filesize
2KB
MD5551db8ba39e5ff32d15826f1e96f38e4
SHA138cf79a55d94f94bdabccead99ef9e38055943f4
SHA256d01b5b592a1c6208a66dbc74efdeaababe986e7d4449d316317c1f2dc2ae4f79
SHA512f963f841b95d02695e1eaf76eae060ae0947bc6e4e917dc609572508c9a1b069228a40f9d95ea6cdef083606d65fb2ed0dc8a3f6a41681a0cf7ee8fb68a43e1e
-
Filesize
866B
MD55764ad0dab3d5b213b6b45d2d54b0a46
SHA1b5cc72ca16cfdf7c8acf7f60a065334b4f99cf82
SHA25647c3508b02ee73e8ed4d6e7bbed607adf25891ef5437d5211f98991f91b1a3d1
SHA512aaeaa931ab2efe59019d0093893119e4c3aa2af725c92e1f3fd3eeee520873985e2119ceb5df6d98dbc175d0e64548a18f5d4edcb5013b71dbe706a0d382cd12
-
Filesize
701B
MD5f7f55241467920f0eecd094c1bf610b1
SHA150ef8db071bfe8f2472806fb4fb72e5f829967d8
SHA2569b3a5f2841f751ade6cc793f76c89146897548f2e42bdf5672fccafd6c298d21
SHA512a9fa07fcf2a55ee9a441f181ab6382b36278630451bef94a9a65806d7937af31fe697b01dbf9b09c2a3308a561d204c25c3142cdc9937523ea0225f465604dbb
-
Filesize
1KB
MD507e9dc757bb1b39bb32f17b143819a22
SHA1de1d8a5030cb72c2e41a6ed1572d51baf8a5184f
SHA25668f49ab2cb8c6ce71ad3beb07d351f4ec69561c6351d1d363be3712efa5ec213
SHA51232145d2ad01f7eaee5558e1c2c2bbd21cc148ae6325a98c061147fe502a6f23c883aeacf1f521d6c019308fe0ad1b2753243984f4f57a482a341101678c73f27
-
Filesize
5KB
MD584516f79982d01f23947abeffc535e7d
SHA1ba9ffebae9b3767305bf5617a164f2bdab9bb1f2
SHA256a21e68ecc2d8d06a6f3186b4985e31b7ddde2596ca2b16cbff9754dd9b052cda
SHA512620bcbb7813f55056de3213bb18a101dc3c56edb6f74d052cc6a5685b45517bf1a8534603f9f439d6b5670bb27c87f6d9660733817c38e1d6e86a7669c407dde
-
Filesize
6KB
MD55be3fdb9131e2eecef3c61b119e56008
SHA12eb8bec3dcce2354800a7e8822e763c67dbcdd23
SHA25636d43bd43d1ebf58bd67f8f4ab498a9d3be82dff91b97cd95d97b92ecc7c603f
SHA512e1a53a4777d3389fad63784d164f5508d3515a7fdbfcb50a5e97bccbc1abeeaa8d1a6c1104a4672ed3127ba96b11d5b8bd7ea32b5ba85bddf3c220aa696f7668
-
Filesize
5KB
MD538d5843be1251456f529c2aa0ed3816f
SHA1152cfb1c93e29b52b9de64061326c11f58bc1647
SHA2563ddfbbaf06c0758672b8c8e9364efb0ba7fa41b64e6122f7992140dac71e3041
SHA51206f6566bbfd241e0aeb021aa5d0a2ced7a98740ccf06c5609d1ec07b935abf08160c25a9a32ebe6a6cbb999a53eebfca236764b35f3d8dcd77dd925dd10537c2
-
Filesize
114KB
MD5a38a9d251b4e76944a642d8e091e0945
SHA17c64baba9189b81d746aeb3c478fa660b247d5fc
SHA25609dec5b58c7bdb97a517fcf58ed62f39091b8362f7e01817e6f01cef4626270a
SHA51266496fe36a7cfc7b8b82bed763c9cc5e4f38d36a35530e6f867013dcbb68eaf0a0a2b243ebf6f5742ed0be09a3fbe14217bea95418f371abbe7552055b25c891
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd