Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
59s -
max time network
54s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/03/2023, 21:42
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133222705555128579" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4124 chrome.exe 4124 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe Token: SeShutdownPrivilege 4124 chrome.exe Token: SeCreatePagefilePrivilege 4124 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe 4124 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4124 wrote to memory of 3624 4124 chrome.exe 66 PID 4124 wrote to memory of 3624 4124 chrome.exe 66 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 4264 4124 chrome.exe 68 PID 4124 wrote to memory of 1732 4124 chrome.exe 69 PID 4124 wrote to memory of 1732 4124 chrome.exe 69 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70 PID 4124 wrote to memory of 4196 4124 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.goundfirefilmpouch.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff5a0c9758,0x7fff5a0c9768,0x7fff5a0c97782⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1760,i,7936545768623889086,8880141115560265498,131072 /prefetch:22⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1876 --field-trial-handle=1760,i,7936545768623889086,8880141115560265498,131072 /prefetch:82⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2116 --field-trial-handle=1760,i,7936545768623889086,8880141115560265498,131072 /prefetch:82⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2896 --field-trial-handle=1760,i,7936545768623889086,8880141115560265498,131072 /prefetch:12⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2924 --field-trial-handle=1760,i,7936545768623889086,8880141115560265498,131072 /prefetch:12⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 --field-trial-handle=1760,i,7936545768623889086,8880141115560265498,131072 /prefetch:82⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4872 --field-trial-handle=1760,i,7936545768623889086,8880141115560265498,131072 /prefetch:82⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 --field-trial-handle=1760,i,7936545768623889086,8880141115560265498,131072 /prefetch:82⤵PID:524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4892 --field-trial-handle=1760,i,7936545768623889086,8880141115560265498,131072 /prefetch:12⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5032 --field-trial-handle=1760,i,7936545768623889086,8880141115560265498,131072 /prefetch:12⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1760,i,7936545768623889086,8880141115560265498,131072 /prefetch:82⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4724
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672B
MD5a9db4da8b02aa91604c20cb1b11fac20
SHA152345993c5a5aa847b4c9bb1a1f8a0da70fb12ed
SHA256968d1f7686515fad91e02bcb943e04c823a01729f0e9ff05c878980be940d9e2
SHA51272e243df5ccde9d80929691c22d86de2bbc9ec66f881ec60ae747e418b732667b7ac94369d9f6ce1422a36a4f5b99bb989cfc38349eecebad2ee6d440c2d1fdc
-
Filesize
576B
MD537fa4ddb98b3afbd5845b919cafa979b
SHA146e062949a18c5165ddcfcd23987ade5b45046dd
SHA256c4705ca187f1f85d4bbf18500698e01267f4051ff566d5b75ceee246e2d48a31
SHA5123fa78421ef3ff66aa90d10290fcaa36759ac4bfb9d5ce8628139fa6ca5f435b5710631e7ba896f3943c7167041c8d1b8236929c3daf91131264977938bd2caed
-
Filesize
539B
MD5696f9562cd46dde78c8506f672288f4d
SHA174396c760aee751404be383f93b66000100a85bd
SHA256689f8c473ffc650bdcf6ee0427a53591f18f9c179abfebc8f05aef0e9deb8cda
SHA512b7b494ab790877fc7c2626bcaafe0765d80e642687cb47c5c7a3de67e6eff13619bbc8a41d600fe46c39f20b6a7fe2c6ac83d84678c63029da51caf9e85158a1
-
Filesize
874B
MD539d7defe30e81d4466d6386110354355
SHA1332a909f715e5d7c3a8e3b12906c30b76d54c050
SHA256a8a034324b81af982642618d70a55e061d092a747b02bfebad96affab032dce5
SHA51229bd159fbaa0470765c49492f86833362057d6179bc2481cd494ecfc0944f1317f27c84fcb48487a89c0feda39bfba375c8186fefb113b00ccfdada73138c8b6
-
Filesize
5KB
MD54d75e09c78f09cfc1e743e93119b0fd4
SHA1cb053517d1d083cc781c06873ca23320138ee2f3
SHA256ca926542611f44a726ea1f4abab7d647214f9a7cad3693d2e663b24cb47bea71
SHA512de0fb3f5ac37d4015d21bd1c15637042d052afb0ec958aa2dcb1165d09061c36369a5818ccfab0e82dab2803e39ab91061c067f6e05b285d635a34480a6b1889
-
Filesize
5KB
MD510fbb681a80c4aa97a28423637fe03e5
SHA12b521ec2995c8532103202cf61562c316666909c
SHA256fc499c040b63763ee58fdcc361f03119fcd2cd2a3ceb77584af1a2e2894b4c00
SHA512b3d8b50c36f3ddec7a66f9d283cbed1e8382298cca96b4609b512e8f01430bed98a806cc77ccffc10623e221f021525bbf23e7d4ee268f5c65aa022942325672
-
Filesize
12KB
MD5edb1c8051fe5462c659c993c73a87c63
SHA13124c67f97a1e5b195f2427610237faa7626a5c8
SHA25649d03ef0e8e03a4822c9c52ee94db0b6e26e488a89f2958d875334c50d29e610
SHA5120cb8e944883272a946ba7d218bef5822d7c0f4e38719a0975740c6f15eaa5d454b0303ee17d14366867f5d2c43a4cc84ea1cd38bfe7b47e302098f3f24d093f6
-
Filesize
142KB
MD530723d68147a841fcfcf1f6c416ffc1c
SHA175a96eebf5e3acbc826f0e1c37300910d9121230
SHA2561ac390b3359b4f45408b6565e4d7b18f807e9ef93cf6086ddb1643e5c3b0ae2c
SHA512e64fa89da05475812507c48f2605c980eea4b837fb927a5eb32c965aeff7a3d17f1c7b74c60268f693363042afefda1caff6599c7f4b651e15f7198bdad895f1
-
Filesize
142KB
MD5854e573175d20a7f87da7d1d60da94d6
SHA17ca5a43d2e9b8577189b152f0d01da8559605b89
SHA256b13913ec8c18c2c7dea6d45ffac4b6d8b2d38a0d2c763fe6e5678fc3c989fb25
SHA51208c37e8f42416baf10ed09a82e26745e351ba26f87a799760356c55058ddea06c6e7c902390f206bfb9869f1c6486a21ec8e9c5845bc031d0699800292011d92
-
Filesize
142KB
MD5f52185917e4aab47fdf3edf4faae8aea
SHA14c8bc0674a375dc81207800ada48de672a6a34a7
SHA2561bcf0590eefaccef06a68278cc60a1ab53b2e6b9f19d78b20e9a2c8bc4297fe7
SHA512f643c3645c199218f005a05ffa8cc0b414f888749ddc10fc33d3c0b36cb198b3f2884220aa95bf01f4e19db034719dbd44d26412f091c7536fe2124bdcd5d82a
-
Filesize
99KB
MD51297ce990b098da3a982d6746f1d2c97
SHA1e438cc1bb54f37fcbd87c77d140a51a757273a3d
SHA256f7d47a4f0d3be30cdb298ba25ad0d02612880f0adceef684253ce9a75399c53e
SHA512303f470f7f7d79d6811fd776f36482cdfa6a45bd92d86fd031725ad4c65dbf8788d3bc0ccf42bf46dbe985d95e491c24fa04904ff6f4fb371c94142f204e8c7a
-
Filesize
98KB
MD5c3f50bcb754089c3beab0dff27e45013
SHA1bb645b2832ef561c26d2ab84888932431f721bbe
SHA256b9488055d1bd51a9a50c830410e5239017a5b655404be83cec1ce02f2c68a941
SHA51232889b4c6cc85c359f50b45d01ae654be5f53f9f1af5d844175c55d02243febc01c6499d5bd9df3499e8519883041072264cc15ead968afa93c250a59e11c36c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd