Analysis
-
max time kernel
78s -
max time network
80s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2023 15:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://1drv.ms/b/s!Antu_dibkKlDgSKYPf0SfdzJUETJ
Resource
win10v2004-20230915-en
General
-
Target
https://1drv.ms/b/s!Antu_dibkKlDgSKYPf0SfdzJUETJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133396966219924819" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1376 chrome.exe 1376 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe Token: SeShutdownPrivilege 1376 chrome.exe Token: SeCreatePagefilePrivilege 1376 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe 1376 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1376 wrote to memory of 3788 1376 chrome.exe 66 PID 1376 wrote to memory of 3788 1376 chrome.exe 66 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 1780 1376 chrome.exe 86 PID 1376 wrote to memory of 4388 1376 chrome.exe 87 PID 1376 wrote to memory of 4388 1376 chrome.exe 87 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88 PID 1376 wrote to memory of 4896 1376 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://1drv.ms/b/s!Antu_dibkKlDgSKYPf0SfdzJUETJ1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea1d69758,0x7ffea1d69768,0x7ffea1d697782⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1908,i,617814732814569135,1446377246854304605,131072 /prefetch:22⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1908,i,617814732814569135,1446377246854304605,131072 /prefetch:82⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1908,i,617814732814569135,1446377246854304605,131072 /prefetch:82⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1908,i,617814732814569135,1446377246854304605,131072 /prefetch:12⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3196 --field-trial-handle=1908,i,617814732814569135,1446377246854304605,131072 /prefetch:12⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4600 --field-trial-handle=1908,i,617814732814569135,1446377246854304605,131072 /prefetch:12⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 --field-trial-handle=1908,i,617814732814569135,1446377246854304605,131072 /prefetch:82⤵PID:1340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 --field-trial-handle=1908,i,617814732814569135,1446377246854304605,131072 /prefetch:82⤵PID:3508
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960B
MD57065945d72798cfaec621821f9a1a81d
SHA1f746b4b46e32d46620353502040c13ccc0dc4993
SHA2560d65fd4fdca358139b54188af0c2f9a21fa437c0ef645aeacd4d92802106ef4b
SHA5123906d20de02f912f32cb92285ec351a7af4100b1fb6d1e7e7048df0fdfcc5fbc7b39067b4792a895726e5b0af217e6b7d1ce15f44fcf3e0b9dfd9de003c25a83
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_onedrive.live.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2KB
MD56649a08bf99688635e1e94fa59fc48e9
SHA115783d3bb2a42b732d50245fe70baf2946ab0450
SHA256966bfbb1dc1d7270182cdef5730f64f02f3af70640756ce7f08c6d2e405fa0ba
SHA512c7065b968055240cf99c38d6723063b9cf2107728f0f8607277f642cfe0c8ce6c2d56481603c2655bf31335d28dfc72d9b950e303553489e49aecce67616dc74
-
Filesize
1KB
MD5482a26a87fe67bc85adbf5c2e2877250
SHA1ee0bfb4943c5ba6416164459d6166b819ef4f05a
SHA256679c1ed29c04c4c8c4dfe9d8579d7f6b2100cfaf6ac84d481fadf7ddc7daa008
SHA5127aa445c2814747a77ee51c6021b907ec48ac21dd8b05b1269ee1e402b6af705ebddadcbba966bca9ffd1cd2b78c7830cc113423c6a7a0c338d8aa947c5a24ab5
-
Filesize
1KB
MD5b18d6fb8d039bf0a97185359d9fc4fb4
SHA12a902832aad41ca6ab3a8bdc79df797d334f2de1
SHA2565835b1c2a9ea5dc659323e44bf97de7e0d190300ea5f6d6720f24c859df60189
SHA512e0c01a9e03df022b0b15491de67816216489f198602e26277a3abdfecd15f35d02a1951f29e2cfc55be912ea2f44347c4e9e5c1ff34c902f86630ca451edd716
-
Filesize
1KB
MD577d8ce8eb051cb371786021c06773b02
SHA10855be590b3bf28972053f7c58b272294fb402ce
SHA256ad3ec8b3000881351183a24205777733dcf024abd13f0a03b60c12e9bbff0b64
SHA5128185f78290c919e35475815cc6ae9efc2315ea1182c476133b295b88982f4425167c3a9efbf70c74dd3ffc60622b2923b67eb9e9d94d425016b1059d596debf9
-
Filesize
6KB
MD54a3ea37d9ca918d3419369faaf75d4da
SHA1b2ba93f906e0932ac56c31e7c0003ea4a17b7743
SHA25684a37393e5b1356f408ce1026f94d5f2570c15ac04d3b81bdfbfa7b05d3d88b7
SHA512d58f1b194db32bbcba1b999b673d92e83f03ef067851d4101f4da2dc2f24385167a3f69466cff178fd411fca1ddfe947d9f5706d4f75c82f871d2093856be21c
-
Filesize
5KB
MD5d1919c0c00dfdc0875b576828608d252
SHA10b1712033dceba2062d0a0d3c4d820d4373017de
SHA256090559e96274fc4e42ea61e82e821d2784ea8c71b1948cd45644c91f04276f97
SHA512c574ace5d64a0afff65d0407b104db1e7a4e6834b0cd6eacacd02146edb64133315ac3e63ecd88b2d58c4831ca4a7215e8c89334bf9fcea5f1578540921b5ad7
-
Filesize
5KB
MD53fb7891fcc0669d871edfb571f9b9502
SHA1c3866356b8e47e28cc6b65a04696501de3e4a400
SHA256fe1a9f2c2a8449187f7fa1f83d7ddcd5c558f59285eb245e9be401c337872a55
SHA5129a3681fcae6abb1c9091ac9ec2da81e4b2303e166ccfe8867d3684103109d8d7c73db37994ce08c2a619111f801c7b89352ac00d4b9a2354aadb52211c26eb35
-
Filesize
5KB
MD57c36e27232ecd711cd1cb3f393c5b2cc
SHA1d2a6ab9a1270f36c177fdc1c9daadea0e752cdd1
SHA256a051ea0565ae19306f6d59d4c5a1b775b5b5a3d4d3d4c0b1dcb50cde7b127034
SHA51228fd6be6225ad016ba4f9bc2ce1b2c263a38e55bf9de27e1fd27df71e3d7ff07356d54ed7aa22dd77c5e98bf699b0d3a524458e1f15b20d4c70ebfb5c076b3d7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5da2be279aea68a163da1b3b88f811f24
SHA1249ed5957a49809ecdfbd811f64406afcab575e2
SHA256870d887cd4a8d08665c1729e5f0bdb3665d6ae743a24869d618182236e09d530
SHA512f42911e97b57b37881f12843cf718b833b091e8e4ac7efac7ab7174b2b2e509991ea862cf1bfa5a6b50cc528fc64bd4ef8d4464dd4b86537ddc88ee0e7c561a8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5830ee.TMP
Filesize48B
MD553e9dba0e47dc2ba801d496136de754d
SHA10080ebce1773dcf8ef62e05f7f09ba5dfd3be989
SHA2569129d5db70dfb21e43d8f50f725ab85429e15ebf0cdb35a891e3eb78fba8e4c2
SHA512abe08fee54e4a221d2b8f31b5f8193b80314d147115b3b4dd82c4d9c8c79478055f6f5e640a2badc41b4b7d1e7812cbf5c3393b662d47f46aaa10399abbc0354
-
Filesize
102KB
MD5cd3dbe134169b1441b49e9e38f6c95d2
SHA10504268f3e1247e9f1ac671c5d2e51c8b94a4192
SHA256112759ffa1c8fe6cd672a93ad56e2d70385fcafa27242db81d5d075ddfb5a92d
SHA5129e801ebbec6d39f54cf4de9ee5a9650c81cd56fc44bf6a5524e287a4bacccdef1dc019b616bb637a379809aef89518bdcd6a25c3303b814c38deb0c8aa448a38
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd