Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 07:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://vk.com/away.php?to=https://empresasjps.cl/powerhouse/42390301/SkRKYWNrc29uQGxvY2t0b24uY29t
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://vk.com/away.php?to=https://empresasjps.cl/powerhouse/42390301/SkRKYWNrc29uQGxvY2t0b24uY29t
Resource
win10v2004-20231222-en
General
-
Target
https://vk.com/away.php?to=https://empresasjps.cl/powerhouse/42390301/SkRKYWNrc29uQGxvY2t0b24uY29t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133501229637202142" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3836 chrome.exe 3836 chrome.exe 4880 chrome.exe 4880 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe Token: SeShutdownPrivilege 3836 chrome.exe Token: SeCreatePagefilePrivilege 3836 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe 3836 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3836 wrote to memory of 3784 3836 chrome.exe 63 PID 3836 wrote to memory of 3784 3836 chrome.exe 63 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 4992 3836 chrome.exe 95 PID 3836 wrote to memory of 2184 3836 chrome.exe 92 PID 3836 wrote to memory of 2184 3836 chrome.exe 92 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91 PID 3836 wrote to memory of 4412 3836 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://vk.com/away.php?to=https://empresasjps.cl/powerhouse/42390301/SkRKYWNrc29uQGxvY2t0b24uY29t1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff09129758,0x7fff09129768,0x7fff091297782⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1856,i,3333319998729338051,12442196930018658159,131072 /prefetch:82⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1856,i,3333319998729338051,12442196930018658159,131072 /prefetch:82⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1856,i,3333319998729338051,12442196930018658159,131072 /prefetch:12⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1856,i,3333319998729338051,12442196930018658159,131072 /prefetch:12⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1856,i,3333319998729338051,12442196930018658159,131072 /prefetch:22⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4640 --field-trial-handle=1856,i,3333319998729338051,12442196930018658159,131072 /prefetch:12⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4812 --field-trial-handle=1856,i,3333319998729338051,12442196930018658159,131072 /prefetch:12⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4788 --field-trial-handle=1856,i,3333319998729338051,12442196930018658159,131072 /prefetch:12⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3824 --field-trial-handle=1856,i,3333319998729338051,12442196930018658159,131072 /prefetch:12⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4652 --field-trial-handle=1856,i,3333319998729338051,12442196930018658159,131072 /prefetch:12⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4080 --field-trial-handle=1856,i,3333319998729338051,12442196930018658159,131072 /prefetch:82⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1856,i,3333319998729338051,12442196930018658159,131072 /prefetch:82⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2824 --field-trial-handle=1856,i,3333319998729338051,12442196930018658159,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2824 --field-trial-handle=1856,i,3333319998729338051,12442196930018658159,131072 /prefetch:12⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5658187d5b7abc560103c890aa39671af
SHA1327ed69629cd0304bc4b9db7e09e23177d3a5c50
SHA2565eabab9929c37e33918a692031ebd2846fbec91bd582a8efd5b5534e747e0604
SHA51245fe23b8824c19bab3d0c1459d1d87bbbb08a57d7927cd1212483f5a458da5ca9aed92b53fcc4f77ef7ec8925b7f07dcd7075ce969f5ac6a1e7bbbdb8bd7998b
-
Filesize
120B
MD5955b0893588cff138d5f71d55c696504
SHA13a6874bb3df3f72e58631da8a500c7dae21fcc35
SHA256c74f1c3841b38ed17b508f5307a818127ce1ee3a3d82172d2ac14b1d21480783
SHA512a9ae6ccdd175599b03c1982fba4fa6ee1a214865db97e8fbdc6269c133ee058e52abf657169bcdc7ef95e86f8cd7d64bda444a038d6bab53f6d676acf7d741a7
-
Filesize
2KB
MD586e17b9e2c0f24b5011249614b208971
SHA162186a5d0467823203000ecbdb481ac63990b6ab
SHA256309c144bc5eb443cf1215fdf06f76939ee032a2e58623973676fcb34ad3c0c82
SHA51269b386aef1065a581585ac00cae59fc9829d133321c96303c85a43fc5fa9dd3c08ba310b16eb4c82e71468ee1e40f6a3dfe57aa095caf74adb06132e9dca207f
-
Filesize
539B
MD5bbceb42900c8467946c333c06769c21a
SHA1d0d672e381fe40c54e6405da5369df28d88efac6
SHA256203df598b57f6351737affba2fb975fa4b31a086b41de1fd1c2b894c2ad9e133
SHA512740639e86323c97ccc688aa4d06612e922293c5f8dc06856702b8137f8f60c871bc97d9ffcb91e598f9ec7c4617b4dc7966366a70a26646fdc79ff7ec20e108f
-
Filesize
6KB
MD5c4d4037a5b9e94b30c21d86322d5cf66
SHA1443f08326a55d80f709bcb21ebc82286c6b478fe
SHA2568b941efd4970acdeddf4fb378994455f27e01cdda05bdb9c3c38fcc5646266ae
SHA512a6c35d103b2a5ca7093c28689f02193f9ee69d59f177bf2a7bbedfb48d11a9ed76b53a5e8c6dc8f4c24f8337e6897584a9122d86a841bfd15141baa699b73a49
-
Filesize
114KB
MD5487780b2fa87e1e7d4692c75e2bcf543
SHA18c46576942bb8a6868abce5ebc2b55da8a97a932
SHA2560144792593429cf0494bd4abc4822bf42d57219f33e84a74602ea31ceda79cae
SHA512dd3aa0c4935fa884410297e72e7146a8069bba317bd268f5690975b8f5b298756ec5d52b4179fad0e9097084f99532d603941e4e86f8d537660accc7d8b0fbc2
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd