Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 18:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://uxajl4p4m.legance7.com/X3czRg07K/
Resource
win10v2004-20240221-en
General
-
Target
https://uxajl4p4m.legance7.com/X3czRg07K/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133531857769637207" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 996 chrome.exe 996 chrome.exe 3968 chrome.exe 3968 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe Token: SeShutdownPrivilege 996 chrome.exe Token: SeCreatePagefilePrivilege 996 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe 996 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 996 wrote to memory of 1196 996 chrome.exe 83 PID 996 wrote to memory of 1196 996 chrome.exe 83 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 3376 996 chrome.exe 87 PID 996 wrote to memory of 4368 996 chrome.exe 88 PID 996 wrote to memory of 4368 996 chrome.exe 88 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89 PID 996 wrote to memory of 3688 996 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://uxajl4p4m.legance7.com/X3czRg07K/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0e979758,0x7ffc0e979768,0x7ffc0e9797782⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1868,i,6579477203674786409,3305063666396088092,131072 /prefetch:22⤵PID:3376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1868,i,6579477203674786409,3305063666396088092,131072 /prefetch:82⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1868,i,6579477203674786409,3305063666396088092,131072 /prefetch:82⤵PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3220 --field-trial-handle=1868,i,6579477203674786409,3305063666396088092,131072 /prefetch:12⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1868,i,6579477203674786409,3305063666396088092,131072 /prefetch:12⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4720 --field-trial-handle=1868,i,6579477203674786409,3305063666396088092,131072 /prefetch:12⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4848 --field-trial-handle=1868,i,6579477203674786409,3305063666396088092,131072 /prefetch:12⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 --field-trial-handle=1868,i,6579477203674786409,3305063666396088092,131072 /prefetch:82⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 --field-trial-handle=1868,i,6579477203674786409,3305063666396088092,131072 /prefetch:82⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1640 --field-trial-handle=1868,i,6579477203674786409,3305063666396088092,131072 /prefetch:82⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3188 --field-trial-handle=1868,i,6579477203674786409,3305063666396088092,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD57b1a29c4c90185c269ee4df7ecd9f699
SHA14810bbc6056fa781fcd4cca4d319b9aebfd2d8cd
SHA256e0a347292ecfdc79d93c6128beddd637e3553d19688657ac9a268b14a85a6346
SHA5129e03eaa2766ecd1b2f0ad7827c8af5e17bd210ae27664fa8829de8ec0997ae650383fd5a09484f6c7cfc14907043604afb38899e6ce713a7394b0abb3a907b9c
-
Filesize
1KB
MD50895a9ef8bffeb168aceb13db0d5bd07
SHA100a84c028891d6facfc33c8d85c4a0159a413811
SHA2561d9163f50a4f3f9f0bf9feae6e5bb96c73f96b6c20ec3f88fbf87fed526a0337
SHA51240e496505e27f2bc600914f4390181b4314c0f35faaa3d5bbe5686e9d33ae27a911dfd04ffc4453fac585b1c89c798b43e02fad85ea1bbc9e291010590e109ed
-
Filesize
1KB
MD57cfe2ec7fbc0537be774f571c8de6d25
SHA155a91e184ef0ce859a68640d0ee1549a84a2868a
SHA25605c52735fd0344a546b17f2fa1a51fedbe406ebe73e5cf598cb2d4e94cb06db6
SHA512c1dbc6895d5f562ee324fed18d725f3bd545d4b05429a90e7602b638d13c7802905f8c38725af975b2d81cab91142d4914b8c71f0ce9d2af80c14584bf088342
-
Filesize
372B
MD5ad4dcf15be61a77b9ce639d03743f189
SHA1fced462a2cbfc3c32736d0b4b2fef47e74fb3f57
SHA25602bee5c74e8f3b0c752e732551c940f9d15240c03ad020e53a13e9a18c923d28
SHA51273d00aa66fe1a8f9a06401e0c463c80146740d2e2c95f8d051dab2ad312b58daf693eee00d3d9228871364fb2f6a1a09098d557df4100e8264cdd6701c2a6362
-
Filesize
5KB
MD50252448cee2d482e996504a66d430e8c
SHA177dfe8a3685e4342eea5c009c7d01c6a20125907
SHA256ceb2a8a725bd6a40bd7c07da73f29b3b7d243988d4c8dad331343e500219d73e
SHA512498f14f86d0dcb4eaa2d40609f3309a895576314a3061f5d571efd6755e298a2e6193f8e861395d71b3e734932a0b710b52b93f7403713c095dc0aeb0987dada
-
Filesize
5KB
MD5ddfd55e1bc063f74eeaf0c2d47b87f63
SHA117c220d1a242f787bcb7794c98beca478d3baab1
SHA2562252014a3b48c19e917b55eb1efa4a2604bd5a47c5054e4f47ba6b7d5db370f5
SHA512371f86b43abe4cbdb6e1f283485d9279d151e943b0a16cdd37eb231477067ab8e32e094445f3bf7b61605a873ceaf41181bd96aebd0d2419c9057eca6af81f30
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e230313d-40ca-4ef3-925e-b93523ee277f.tmp
Filesize6KB
MD5b15150738f50f40aa96e06d9bcf3eff3
SHA17053fe0ebef4f92f2e311d6e89c66156f82a4720
SHA256f351382729ace84df104a3e85d5e2a913ef06cb64de47c06b097e9f05b10b1c3
SHA51299b5e0b6a6ab6d58cdc6c25f67d9a9a0802bb2ebbb1aa6a7e9f60afc41423bda0af8880b3beca1e2ef1783986871aabaf896ec8fa4d903abcd50e067f4ca8c7e
-
Filesize
130KB
MD5fe89ea97754cb2c61ff59a7df876cf38
SHA10d30849a3a26f7d876b0de3d05a04db8cd36a541
SHA2569380b55749bbb91b488cdb352531cba24a2a6db2c9e39e05a9a02cd821882c74
SHA51291d7815d65ae1028636e1de1988774a641955564c3c9f5952cb9c276cc78d49b2cfd58b25f7e6804319aeee2b2d182366a833ba3d4a57fb2b7d155733d76f71f
-
Filesize
104KB
MD55e8db46d263c878d73bacc69f90a720b
SHA16d622f0a43c59929419b859981b0217baac868a1
SHA256951c3f3d8a7ab4a3ec21cf50d945681f2c455388865a60494af7afd07f4e17b8
SHA5124a78c05a547eb13e08fea5f347303ecfb071fae388a779d2636e683578cb8c150afc3ad718851a13ed1f76eb16c2808ac42f4e6de6a7fd61691c19ede66105ea
-
Filesize
103KB
MD5ab66663b0bddc23a92f42c0de9b68f6a
SHA1142993057e7bf70bf688529782dadff6f9092133
SHA256e3e7e1fa09924e9d04e3f84b2905783374d745b76b018693c0cac02693e6956f
SHA5129d9ca4713bae8b6362cb69015049d78fdaa6f8e3c90eaa709bb62ea5eaf1a2307e5f45be822663c71bce9fd178c8250674a37de7eadeaf33b12af2ccaf9c107b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84