Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2023, 01:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://myato-notice.com
Resource
win10v2004-20230703-en
General
-
Target
http://myato-notice.com
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133367091003027686" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 4864 chrome.exe 4864 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe Token: SeShutdownPrivilege 1784 chrome.exe Token: SeCreatePagefilePrivilege 1784 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe 1784 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1784 wrote to memory of 5008 1784 chrome.exe 80 PID 1784 wrote to memory of 5008 1784 chrome.exe 80 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1676 1784 chrome.exe 85 PID 1784 wrote to memory of 1416 1784 chrome.exe 86 PID 1784 wrote to memory of 1416 1784 chrome.exe 86 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88 PID 1784 wrote to memory of 4760 1784 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://myato-notice.com1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff94f2c9758,0x7ff94f2c9768,0x7ff94f2c97782⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1856,i,161076750455814354,16030118110456773710,131072 /prefetch:22⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1856,i,161076750455814354,16030118110456773710,131072 /prefetch:82⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2856 --field-trial-handle=1856,i,161076750455814354,16030118110456773710,131072 /prefetch:12⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1856,i,161076750455814354,16030118110456773710,131072 /prefetch:82⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2864 --field-trial-handle=1856,i,161076750455814354,16030118110456773710,131072 /prefetch:12⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4064 --field-trial-handle=1856,i,161076750455814354,16030118110456773710,131072 /prefetch:12⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3272 --field-trial-handle=1856,i,161076750455814354,16030118110456773710,131072 /prefetch:12⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 --field-trial-handle=1856,i,161076750455814354,16030118110456773710,131072 /prefetch:82⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 --field-trial-handle=1856,i,161076750455814354,16030118110456773710,131072 /prefetch:82⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4192 --field-trial-handle=1856,i,161076750455814354,16030118110456773710,131072 /prefetch:12⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 --field-trial-handle=1856,i,161076750455814354,16030118110456773710,131072 /prefetch:82⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1856,i,161076750455814354,16030118110456773710,131072 /prefetch:82⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2384 --field-trial-handle=1856,i,161076750455814354,16030118110456773710,131072 /prefetch:12⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1028 --field-trial-handle=1856,i,161076750455814354,16030118110456773710,131072 /prefetch:12⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2380 --field-trial-handle=1856,i,161076750455814354,16030118110456773710,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:748
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824B
MD580012eda23e47c77664dcc8c4bb99d3e
SHA1dff893ee885d98b4c0cad452e7b7fa9dfb7b5dbc
SHA256669955d25d550ae382f250a7ac2c3d547c3ecafd3477b2e4551f812db69d37f6
SHA51245a7ceee9e11a9def6ade1b95364bfdda964c4cdebd2b180748e73092e550c0bcb0875ff30135f1bee53eb358a0e611d34833f5d445c9e813b9b53c9bf78e306
-
Filesize
6KB
MD57714d6958120cb50de6be53eca7e278f
SHA1bfd2f5c7ea877e1db7a1dfb94f046f84eda5c15f
SHA25635c4520b9af01b9ac103c3918607ca9a2f816d6848fbd93cc669c2eb3e9f8f59
SHA51243cdca1dca58a0508583ac6477a25a6882c220da76e585e34f41d3ad85ab770ad17740c551f3a89f928eac0630b510c9feb52f78644ccd4aa73d7d061cfbbabd
-
Filesize
6KB
MD57dd29414981abf0e2db51326f861b2e9
SHA1e170631e8e0a2250b078c6a82fcc0a092ed9cf21
SHA25674b7f9d6e2bb121abbdb56a64656222197ab358686019c72499316498456fa79
SHA512f7eb2abe6fbdf8611558ec0abfb03f8234ed6213131c7d6ac9250e59967b5f82a8a5790dd83c3404cd7b5bc6fb08c32df6b99c1c5acf17ae37d3c5516318c8cb
-
Filesize
112KB
MD537b6bf6f6942a9f10bc0adbad522a9eb
SHA12195243d67387069e28b9ad4f4993da7c176e806
SHA256a1031bef66e408747954b1f51e0b4b06efc5ada2746eaba818f8ce7fc09d7a14
SHA512040ee367064d196d53b5c880a8ae27743d539f024c75d357e796e2271a5aad5b55cd9236ed2abd7ebe854c21438a1dee001ad410550c4ceed13cac1f18bc9e2f
-
Filesize
89KB
MD50b87c14d10ac0a5490389b082e6f7980
SHA1212052d52dbc883dc2fcd6a38b8210c0aa39de95
SHA2562fdd2dd6cdfe4ad6a0cbabac0d65e06f991065dede505cd7f0029aab00276a35
SHA51268f19880cbf972f065f56ca8b5e39ecf047e6126f365a9ba18bb2eb95f0c0e43c4b3d391896348d1ab813e752b2aa0538fd297aa22d25077ffdd63d0df907fa9
-
Filesize
89KB
MD53ecc6ca1e3790b9abf00429dcd5ad606
SHA195adfcd4017cee2927b467665f306b4e2eee98d3
SHA2561c2f3005eabd7f864b553fd5ea2eec715af5747d58a8a6c84504bf9e4b1b0831
SHA512093aa0c46c9b867cf586319b8a2bb5d4348dd08ede91689e94912ad9cfffbb34a08a6731f4b9aca93042d92bbbde18a00f5f41f8d6489f67c0410f7bd2d1b871
-
Filesize
89KB
MD548366438d84a5e90ee8fd6bb16fea8a0
SHA197015952636ec5e04e3ae09c9b697ecf082b6fdc
SHA256fb2cc83f95a7a81c1f5df5dda8af0a9368c8668e0f4d087fe8840e632982af49
SHA5125f783ddc76e0f7d3ee3851c6fa2b79c1524a743cefeb0b3a0351dc4c9acc4074162bc15fda5cf9ce987001f3a2384f03b1ed15a472fc000c08ae37c43b0dd1bf
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd