Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
18/07/2023, 10:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.goelpower.in/
Resource
win10-20230703-en
General
-
Target
http://www.goelpower.in/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133341480884602361" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 920 chrome.exe 920 chrome.exe 4532 chrome.exe 4532 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 920 wrote to memory of 4940 920 chrome.exe 70 PID 920 wrote to memory of 4940 920 chrome.exe 70 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4556 920 chrome.exe 74 PID 920 wrote to memory of 4404 920 chrome.exe 72 PID 920 wrote to memory of 4404 920 chrome.exe 72 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73 PID 920 wrote to memory of 4080 920 chrome.exe 73
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.goelpower.in/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd44979758,0x7ffd44979768,0x7ffd449797782⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1864 --field-trial-handle=1784,i,14814955874595859204,9208600393267821128,131072 /prefetch:82⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2108 --field-trial-handle=1784,i,14814955874595859204,9208600393267821128,131072 /prefetch:82⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1784,i,14814955874595859204,9208600393267821128,131072 /prefetch:22⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2648 --field-trial-handle=1784,i,14814955874595859204,9208600393267821128,131072 /prefetch:12⤵PID:240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2640 --field-trial-handle=1784,i,14814955874595859204,9208600393267821128,131072 /prefetch:12⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4772 --field-trial-handle=1784,i,14814955874595859204,9208600393267821128,131072 /prefetch:12⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3108 --field-trial-handle=1784,i,14814955874595859204,9208600393267821128,131072 /prefetch:12⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4552 --field-trial-handle=1784,i,14814955874595859204,9208600393267821128,131072 /prefetch:12⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4784 --field-trial-handle=1784,i,14814955874595859204,9208600393267821128,131072 /prefetch:82⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 --field-trial-handle=1784,i,14814955874595859204,9208600393267821128,131072 /prefetch:82⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1784,i,14814955874595859204,9208600393267821128,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4644 --field-trial-handle=1784,i,14814955874595859204,9208600393267821128,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2940
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x41c1⤵PID:1208
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53a1c5461d1cb195d00fdb5a217b6d275
SHA166fb9c55fe69b523a6ab49718cd11923f343f431
SHA25642fa4d9a11a37739e63b7278b57b826d8eec81bb40cc201b1f6c4c229a3e3bee
SHA512ec19af4b8b9da90f002dd8ec466e9826f5bafac1c5200f916644e964d84fb24f04e6fb7d4228fa067f79c99d5cd290e748dc2c936a3d59d38b6643134c18f7c9
-
Filesize
1KB
MD51bc72d9e2653813233ffc18162962b6a
SHA1bd9c885cf85d4517784f2edde8f4258e66ebd9a4
SHA25615f7fe218bf0a3fa8c15296f0b4267ce934d464885329923eb126e02af696e9a
SHA5124a15cc5189c1417266a33fed317ccf489f4f9d253801370d00dc75a41a2d24add77987fba8db321ff6b71a72c62b31707dc5dcfd417346b3d1e63590b00bab44
-
Filesize
1KB
MD558acf71eef84d9ccdcfd699393b53de2
SHA14026fb15983eb1da5f1a8a3168967dcf6748aa92
SHA256002ae6c11d548512910f523e5e44e9dbfb2129aad61090e87f7ce16f2c07d8bb
SHA5126461fc867a42315f0de72b9bfd1634c098e9f0e83d544eef628e80bf93b612513301ae2779fbc5df004082d93e0011635698f1140d27904e25e094f71eedfa02
-
Filesize
1KB
MD5faa454f27d04717663191519f3a0404b
SHA154a94b01f4d5a80b985d4effd0c3cf7e4ad4d266
SHA25674bc224c0e0984b25de86a69cd87a750b50ea02515e4591d0bd757121dbe25f2
SHA5129b53f150bf00545271917d3e9764c9ff80178f38d81d18dd93878c88d7c2502ccbf7f59a94d2a715ea438d384d0ec42a09bded2fd4632b18333f99b88bd85ec7
-
Filesize
706B
MD53206383acd73d70d3f23719d33ab7b99
SHA15b6ffc1a1e6fa181f5738912288812b8ae3de782
SHA256ac986d7cdd3cbef0ec50fb07138cff7c71d5bb1bb46944c7a583f305de994324
SHA5123f647fad438146714cf1d56cc216bd351b15591d70188d079f03c84abb63624f7e229f9269cfb7277e2e03751a0708d9542d64be2554171db7159553263024ef
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\acf0fdb3-4bf8-4604-a9b3-65aa64f82714.tmp
Filesize3KB
MD50196bb03eb69a1a308f898bba35c7498
SHA132f629cb8e792387d92fc0df944a6a62524390d7
SHA256698e6ef08eb6074b076977e8614d6b63ebe8c6af0f59a87fb06f7fc59abf0e62
SHA512821d80edbf4cde8d9ec796cf3ea004fa4826f0d949bf09549537a546ca54b00258e9d2f57836c81aa10bd4621ededeca291707e3b0fd5009bcaee7e8785de4ce
-
Filesize
6KB
MD5177e5fca6452bfaf73ceecb329f5f123
SHA1b6b0fc7539148c0291e24c356859e0fc6f3c6966
SHA25649acd4a391df298c7ed0b5cd0fe1052cf7320f3a279b629687c8afd62d1854ab
SHA512e0e560b0820ed3b9f6c526681433e8ef941ae6fed919de6a112740a5766bdb59d79016ccbe58fe02457b78cb880e22611b24571ea8728fad9d7a722e6b4d6946
-
Filesize
5KB
MD5e281ebbf36179a1f07d1dbd73215da3d
SHA183941b9f7664e6cc962ff806be454e53106482c1
SHA256b1b8a23a8844725a44ef93f1c8b2fd1fb5c717f7d0fed0101881050372a2feba
SHA512784bc8686560600868f0e41bb142d177df3ffb99d49bd02619f442950e357be283d756e12c7e33cedf49d564a6cbe5dfca497bc5d4ca254ebf1e039daddedf8e
-
Filesize
6KB
MD55440a99bb7a7bd3313ba20e27af661d7
SHA135308a8bd6f608fe8b6708e9f14669cf75cdc3c2
SHA2564f766196b5b389bbe2d853a9fe12e94ef461248def5421dda8b399b8d849775a
SHA5128218b2916e7513b0dd8f9fa1d64c0f4bc0d1f308215e1a484943594e313b656953b005af41b4ec07fb767a5969ee924cf48c4ec4400152ddc251660b40765b70
-
Filesize
87KB
MD512ac704a124e37b98e21aed08fbc1b9c
SHA17c88419da609a6474b1927eeec450926c94f4883
SHA256b7f428caf78b861bef66f2aebe382a4b0f9fe629d362add81d6ce20621e130bb
SHA5127d96bd099b4eae32b242f28d8a4dfc3a1282530c968f4c1fc7fe7c1cae57f7e68a8910062cd722ae4f19941960b0e290dd13cbc20c22d7d25ba2e226bc953981
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd