Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2023, 12:22
Static task
static1
Behavioral task
behavioral1
Sample
GeometryDash.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
GeometryDash.exe
Resource
win10v2004-20230831-en
General
-
Target
GeometryDash.exe
-
Size
6.5MB
-
MD5
8c73a34f740b59ee613c6128ad11c2c1
-
SHA1
66788bf78d32238a6a89110afe9ee663ca55f715
-
SHA256
1a91e60510b8c6a5e113b9c089e3020fe71a13b7513392a09f84d3588dbf9c38
-
SHA512
fa7b7426ef6d850cf658739c72f3be77bb545e1d228f09816cd3088d90b42958dede51b4381fdb93f6cabb5a59e74bbc82008e063ed3d4af29a5fd1f91c34b62
-
SSDEEP
49152:pxIv8Yz3qRzSpXyDOZF2LRr9BR3Qa2d1ww6xfS+w6xfSExIlvYqb3xCTjzDyW:k0FJSpyDU2LRTRNVxfS+VxfSgI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133383038641472095" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1192 chrome.exe 1192 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe Token: SeShutdownPrivilege 1192 chrome.exe Token: SeCreatePagefilePrivilege 1192 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe 1192 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1192 wrote to memory of 3784 1192 chrome.exe 95 PID 1192 wrote to memory of 3784 1192 chrome.exe 95 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 1712 1192 chrome.exe 97 PID 1192 wrote to memory of 4800 1192 chrome.exe 98 PID 1192 wrote to memory of 4800 1192 chrome.exe 98 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99 PID 1192 wrote to memory of 3728 1192 chrome.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\GeometryDash.exe"C:\Users\Admin\AppData\Local\Temp\GeometryDash.exe"1⤵PID:1084
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1492
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9b9be9758,0x7ff9b9be9768,0x7ff9b9be97782⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1944,i,2183067819817746428,2201959565808629718,131072 /prefetch:22⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1944,i,2183067819817746428,2201959565808629718,131072 /prefetch:82⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2324 --field-trial-handle=1944,i,2183067819817746428,2201959565808629718,131072 /prefetch:82⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1944,i,2183067819817746428,2201959565808629718,131072 /prefetch:12⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1944,i,2183067819817746428,2201959565808629718,131072 /prefetch:12⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3784 --field-trial-handle=1944,i,2183067819817746428,2201959565808629718,131072 /prefetch:12⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4876 --field-trial-handle=1944,i,2183067819817746428,2201959565808629718,131072 /prefetch:82⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5152 --field-trial-handle=1944,i,2183067819817746428,2201959565808629718,131072 /prefetch:82⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4996 --field-trial-handle=1944,i,2183067819817746428,2201959565808629718,131072 /prefetch:82⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5148 --field-trial-handle=1944,i,2183067819817746428,2201959565808629718,131072 /prefetch:82⤵PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1944,i,2183067819817746428,2201959565808629718,131072 /prefetch:82⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5068 --field-trial-handle=1944,i,2183067819817746428,2201959565808629718,131072 /prefetch:82⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 --field-trial-handle=1944,i,2183067819817746428,2201959565808629718,131072 /prefetch:82⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:2728
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x7ff7ba477688,0x7ff7ba477698,0x7ff7ba4776a83⤵PID:3020
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5424 --field-trial-handle=1944,i,2183067819817746428,2201959565808629718,131072 /prefetch:12⤵PID:4332
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
371B
MD581ef3bb95ac6533e62359fcaa554a427
SHA1749c294d9aeb7393da48f792bb34e66f9cfa6149
SHA25611460fd8463fd690e06867ce219f408be526431620d38f05ce37f793ff484d2f
SHA5121d3eb31157070005fb2caa21645e07764fbefb593dbd3d3d8f800407da8916dd8d05db16cd232009145d8802a40181533febd855f4736939716f1673e9ece2ae
-
Filesize
371B
MD52550f643be298d787dcd8c9fe4005e62
SHA17ae0d1e728406be203344475fc70e2c54b80c48e
SHA256ce18b4d88e0541ba7ad214ef8cc1c6e0664eeedb713fc38941643b8ab292e2d7
SHA512c0b6408dda65d1c23e30e0e46aad84c9b486d4b3ebbc3ae331f276baa587e2794524df996bcdff6cf84a6aa29534872e2242768c90a1464cca29b682d0360622
-
Filesize
6KB
MD58a411aa8d821f61754e893046fa46568
SHA1d1e0deb6db821e370805c0fb0bba7e316e3d4eac
SHA2569d52c4b3d3e7465a0ca973a9942c38e9284907b83abac4e54050469bff0221fa
SHA5120bba1a577d0663439837ae1c97b890850950a23de17b00ea7cac075a29567795ec8e7b628c4893a1955e35b1e7e8f511d4eb0347838541754a16573cc57f0f79
-
Filesize
6KB
MD5a0021a39593cf8e76d2c78ed944da7b3
SHA1467debfed364e584d6a9203703a1164c7dec7d50
SHA2566a63bac65bb568470d92556f939a21a9ea15b1e15d8098403702bb850e9ddbcf
SHA5126f9f1a79bdee88bd94cf504fa9a2b8381924c2afd673993f0e7ac32e38144e8708be8dd8f31045fdf50a7306eaf3e2bd8bf6140ce2b94163598e6312bb4bd9b7
-
Filesize
15KB
MD5d2147762fc49f398904fcc1edc22506a
SHA13d0b80780d4bbba0a4fc5950cfa5f2360175fd1b
SHA256db2b266a68716bf1b7e6bfddf0ac536b35b29db28f9b71c3b52fb64edd89bc07
SHA51219626733efe3a0e066f2d5a7efaa1ac394f5a0c833da691543675d68bdccc79b2480f57a4af357de8f589a471f05bbbe647f70d90064c8d3c68ad933bfc1e3be
-
Filesize
192KB
MD57798c51eaf2654a633fff6a29e6f43c3
SHA1f0c1c19102032660102c3d4c6e50b4ac6fbfcc20
SHA2563667fca56762770ab20de87c7a66dc8e21ad4f6f9be0a4d3c27398ccc0f357a5
SHA51204b7f569b06daa48b40f56fca21ba276ad9ae8874b1e2015b9e9da0cfa7e89de69a60a12498aeba94d0b8fc1333d09694b1df63546ba5899ad131f11440ba3ab
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd