Analysis
-
max time kernel
58s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2023, 02:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bit.ly/47hBssE
Resource
win10v2004-20231023-en
General
-
Target
https://bit.ly/47hBssE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133446632970914987" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 944 chrome.exe 944 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe Token: SeShutdownPrivilege 944 chrome.exe Token: SeCreatePagefilePrivilege 944 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe 944 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 944 wrote to memory of 708 944 chrome.exe 69 PID 944 wrote to memory of 708 944 chrome.exe 69 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 3084 944 chrome.exe 90 PID 944 wrote to memory of 1500 944 chrome.exe 91 PID 944 wrote to memory of 1500 944 chrome.exe 91 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92 PID 944 wrote to memory of 2272 944 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bit.ly/47hBssE1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffecb0a9758,0x7ffecb0a9768,0x7ffecb0a97782⤵PID:708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1868,i,8007339929415458655,2986288047714148153,131072 /prefetch:22⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1868,i,8007339929415458655,2986288047714148153,131072 /prefetch:82⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1868,i,8007339929415458655,2986288047714148153,131072 /prefetch:82⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3128 --field-trial-handle=1868,i,8007339929415458655,2986288047714148153,131072 /prefetch:12⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1868,i,8007339929415458655,2986288047714148153,131072 /prefetch:12⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4488 --field-trial-handle=1868,i,8007339929415458655,2986288047714148153,131072 /prefetch:12⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3372 --field-trial-handle=1868,i,8007339929415458655,2986288047714148153,131072 /prefetch:12⤵PID:3612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5532 --field-trial-handle=1868,i,8007339929415458655,2986288047714148153,131072 /prefetch:12⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5128 --field-trial-handle=1868,i,8007339929415458655,2986288047714148153,131072 /prefetch:12⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3304 --field-trial-handle=1868,i,8007339929415458655,2986288047714148153,131072 /prefetch:12⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 --field-trial-handle=1868,i,8007339929415458655,2986288047714148153,131072 /prefetch:82⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4640 --field-trial-handle=1868,i,8007339929415458655,2986288047714148153,131072 /prefetch:82⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5812 --field-trial-handle=1868,i,8007339929415458655,2986288047714148153,131072 /prefetch:12⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\2fc057f6-fc57-4082-b393-fa4ae107e721.tmp
Filesize5KB
MD5fb33c87fa71206f64f3d05c97de8d0c9
SHA17af6fbc5e684b134add31d535bbbb66675fcc0ee
SHA25697d1ea57436c144617ad1b693491fd13e25c4515076b21c9cba3e7da16cafcc4
SHA5120d4a7ed0585c22369af870d7bd91be40531578dc099af4e3e9d35d1126a117368e34d2cff059570ad80fada6eba8f7835fcb6aa8d7b136d7bd1044ef3cef56ad
-
Filesize
1KB
MD5729d9c641905b595d9aea4f5590d81ba
SHA1d77e811bbb270a4b4c3d5dbe5a9f595d280528e9
SHA256d8c55bc6640fb8eccce2b2ae9342e0b5342e462760b74372750501f5ff2c53f1
SHA5127c146d58f5f865582e7c254aaa256d2f3be23f4b75d1a9c16f0be1ce2105bf308caf13491e4151b5520cb4a09387176306d15f75fc7175787b69bdde8b161b31
-
Filesize
1KB
MD5775af5c7eccd934b0915137c036fab35
SHA14de16a14c9e5504658e12184a0c98c29b83a2294
SHA2568221196dc25de1b424b1439599cef96ee5506dd1f3d563b2c6e20f19bef44330
SHA512ecc6ed674feb94efad9ddf5879f646b9b397bde3888802965f792030b18c6705a96d6a3aad87409a84e2523c55e1665dc7698d4623a496142f7b824437cd6f5e
-
Filesize
3KB
MD50c593ad941a2a336e3a5fed07f43f06e
SHA1c267070644f4967283906ddc2a80bdb5094ae0c7
SHA256f090c787b5dd99cce5600d988615acabc6df4e38c3ae04dc38b0d9084251fe45
SHA512e2110a9758ae46cf34d59a3f5125d255ce9a2012a3435212ecb8a54c669eb69d947621b4f539590ee724e5ff40cd2243794e115ff743c980a0feaa8930e6250d
-
Filesize
3KB
MD5470d5af4d1b3e09b027b0a81ae0b4874
SHA1efde2a3905c83f80538ac20c73da8a32791c02bb
SHA256e02b42616b550b65b2f28d3a833a45c14c75714022098d38c9728f0164887737
SHA5128305164753dee0c2af00f37cec9f46ea94f2d530e0ae6bdf4b993a563c430f55c9c62bee08a8148c494bff1d64b0ee3495480c606ecbf318a5c0582354520619
-
Filesize
3KB
MD587858a567a5fedc631bc507d6879e66d
SHA1903b09cfcd0863374741ea1a5defe86a432619f6
SHA25609cac905232cdec0bb53a882d2bcc74189141ad595a2f9a805b4f807befc902c
SHA5123318d2205b835f7d6f2676a0248ab05699ac0d74cd72aa3ea2432f591002f88126fd86eaf78b849e4550ec460f9e3542fa25ac0a19917d19b60595e2fdac5bde
-
Filesize
6KB
MD53e8d8e50580d9d6354422cb98a56711b
SHA1c5d03c41f8a035b913d01717ffd8bb4f38092b4c
SHA25624cc14aefedf20743b5b46f94e1c719271567b1abde9d069dfcbd9388d092b27
SHA512ae209db276e21ef54d8a29ab7832d673fb9a1dc4af05114cac10e54ed5b01ddc8b02d31b1bef0da075a7061fef1a83b230ed374e4f60b93bbd1eca36702c01e4
-
Filesize
6KB
MD5d8ac222b963d12334dc1d72c1c636f82
SHA1fe9ab7c0bb281ff830337f7e41cc5f59263ef477
SHA256bee083e984349ff5abf714d279e6aee857ad6fc2eb797fc2492bb36ca92cbcb5
SHA512adc3a082c41e6c3ca123510046e4125253f96e6ba5d6c4c282abf146680f9e8d7615ae7e5a57349d7ec616c20615462fa72585b8b5010c14f6e951468696e6ad
-
Filesize
109KB
MD5e5831c44c1cde0109cf33dd165803f96
SHA16f86578adba2579b852c9269c279a895c86776b7
SHA25614d9b46cd9ac23f45161e0470c5da2e97027d20c2a5a280e8eaec37b1a261af7
SHA5122f99ba58857990c3ffa49259af83cb47a9f10aff2eb83f5cfc6a877583faa977af488b3a6b4845be9f5351ab4c02a6aa474da929bfff28e7e7b9ff34194f26d9
-
Filesize
109KB
MD5c9c7282ee2e5eab8a0fa9310332cb4fa
SHA1d1ba338ea00199c7fee305a98049c41a749878a9
SHA256dd4ce15d4ea613a197447296d2fba2d1dc2ae96898e1c3f8c1d92a85bcd9f0af
SHA5125ad258ff76b76e2f8fe8d78f7dff7fc906fc2261bb1a950ec89cda6a5f6dca144ba6f63e637b2749f1156531567960c1628983fe5db0d49c19449be1d82d8894
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd