Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
600s -
max time network
570s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 22:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://wearedevs.net/d/Kiwi%20X
Resource
win10v2004-20240508-en
General
-
Target
https://wearedevs.net/d/Kiwi%20X
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133637424379577619" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3296 chrome.exe 3296 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe Token: SeShutdownPrivilege 3560 chrome.exe Token: SeCreatePagefilePrivilege 3560 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe 3560 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3560 wrote to memory of 1896 3560 chrome.exe 80 PID 3560 wrote to memory of 1896 3560 chrome.exe 80 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 2600 3560 chrome.exe 81 PID 3560 wrote to memory of 4420 3560 chrome.exe 82 PID 3560 wrote to memory of 4420 3560 chrome.exe 82 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83 PID 3560 wrote to memory of 1536 3560 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://wearedevs.net/d/Kiwi%20X1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ffe986aab58,0x7ffe986aab68,0x7ffe986aab782⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1904,i,8011500098129426533,12729957145956819722,131072 /prefetch:22⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1904,i,8011500098129426533,12729957145956819722,131072 /prefetch:82⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2248 --field-trial-handle=1904,i,8011500098129426533,12729957145956819722,131072 /prefetch:82⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1904,i,8011500098129426533,12729957145956819722,131072 /prefetch:12⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1904,i,8011500098129426533,12729957145956819722,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1904,i,8011500098129426533,12729957145956819722,131072 /prefetch:82⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4048 --field-trial-handle=1904,i,8011500098129426533,12729957145956819722,131072 /prefetch:82⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5112 --field-trial-handle=1904,i,8011500098129426533,12729957145956819722,131072 /prefetch:12⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3168 --field-trial-handle=1904,i,8011500098129426533,12729957145956819722,131072 /prefetch:12⤵PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 --field-trial-handle=1904,i,8011500098129426533,12729957145956819722,131072 /prefetch:82⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4560 --field-trial-handle=1904,i,8011500098129426533,12729957145956819722,131072 /prefetch:82⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1904,i,8011500098129426533,12729957145956819722,131072 /prefetch:82⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5056 --field-trial-handle=1904,i,8011500098129426533,12729957145956819722,131072 /prefetch:12⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1552 --field-trial-handle=1904,i,8011500098129426533,12729957145956819722,131072 /prefetch:12⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3244 --field-trial-handle=1904,i,8011500098129426533,12729957145956819722,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=1648 --field-trial-handle=1904,i,8011500098129426533,12729957145956819722,131072 /prefetch:12⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=1664 --field-trial-handle=1904,i,8011500098129426533,12729957145956819722,131072 /prefetch:12⤵PID:1120
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD50e2a287c42ce2c415bd3ccb4d91e3f2e
SHA154507a22b873ab037842b85c815b760951a33ecb
SHA256a622353c1afbb4be129b0def7dc3abe5e435d0bad4979aa00b5f4faf6c0c7182
SHA5124b706eb8d7daa3c70af173979e6fa2eeea8f3ef63ec5b9e2a19df9ab75f1f62e43b8a349cfd388cefc1425c03eb590677f2c7b1a1a3e210ad089d3c31fd14cb6
-
Filesize
257KB
MD502c537f342e7dc8658218c428ac2009d
SHA1aa06eea650f7480989891ae62330ebf9701d159b
SHA256f2583fcdb73e2d67caf827581f98d502456246fea6a3c6e4c20ca3023aeb8a6f
SHA512d6ac84732dd56121816e0c2a34f686ad9c69e88ae52adb225876c8e4fb9da5687dd0a144b5e128ecd17b3db0e5c51d87ab54fbe390779896a9fea55d0e3b179c
-
Filesize
91KB
MD5996e1d97d2066fc065c1de31fc7dbeab
SHA171000aedc91b5d374049ce9f075b63ed6282ebc6
SHA256bf84e7134fd7dc4729ec714cd048a27c47e7961b40c69d81a857dbe4283afec5
SHA512e59866528d92195a64be89e67509b6946ac76eed708f3336c570cb9cff034dd217df4725cc24ff105252021528bbc4d400a3fbf93718bab2e3caed294172fd1b
-
Filesize
88KB
MD5b4448e49e22416953e193acc147c9323
SHA11cbbb6b3aa128303598d8601d19dc1fc28560995
SHA25681836c29ef93933da1b2350c461b71e0dd8105788ca5a3d17faf94e0fd0050bd
SHA512c01621c8a071cc6f913cd06c3469e445a187f627bbd6cc1d619423479289fe55b692010c49a140819ecb01249fa59eb321dfbb01cb8e048af3c8b8cce12aaa75
-
Filesize
257KB
MD53bd513b4d1a9c682826cc11125501e2c
SHA1bca1baae20056bc4a144fc16b091b0e4a00e84da
SHA256ca04230fa62a2576d505453ddb7bbea549abce4df8df19960d3f575b9c3f94d0
SHA51284fb77d7aa98aa1bd81106b861e0532e990787558960c8e353f58438da45a0d3a9f1a5059b6a12c8a2a401f9cf5bf96838148177c6a5938f31ec89c8fe8481ed