Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
306s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 09:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://5t3.aloviec.com/?dD1jJmQ9MjIwMzcmbD01NTMxJmM9MTExOTk0JmF1PTA=
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://5t3.aloviec.com/?dD1jJmQ9MjIwMzcmbD01NTMxJmM9MTExOTk0JmF1PTA=
Resource
win10v2004-20231215-en
General
-
Target
http://5t3.aloviec.com/?dD1jJmQ9MjIwMzcmbD01NTMxJmM9MTExOTk0JmF1PTA=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133488344058720291" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3208 chrome.exe 3208 chrome.exe 4344 chrome.exe 4344 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe Token: SeShutdownPrivilege 3208 chrome.exe Token: SeCreatePagefilePrivilege 3208 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe 3208 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3208 wrote to memory of 1424 3208 chrome.exe 90 PID 3208 wrote to memory of 1424 3208 chrome.exe 90 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 5084 3208 chrome.exe 93 PID 3208 wrote to memory of 4236 3208 chrome.exe 92 PID 3208 wrote to memory of 4236 3208 chrome.exe 92 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94 PID 3208 wrote to memory of 1964 3208 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://5t3.aloviec.com/?dD1jJmQ9MjIwMzcmbD01NTMxJmM9MTExOTk0JmF1PTA=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8243e9758,0x7ff8243e9768,0x7ff8243e97782⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1924 --field-trial-handle=1968,i,14611487652936271280,2774927841767142760,131072 /prefetch:82⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1968,i,14611487652936271280,2774927841767142760,131072 /prefetch:22⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1968,i,14611487652936271280,2774927841767142760,131072 /prefetch:82⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2972 --field-trial-handle=1968,i,14611487652936271280,2774927841767142760,131072 /prefetch:12⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1968,i,14611487652936271280,2774927841767142760,131072 /prefetch:12⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5308 --field-trial-handle=1968,i,14611487652936271280,2774927841767142760,131072 /prefetch:12⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 --field-trial-handle=1968,i,14611487652936271280,2774927841767142760,131072 /prefetch:82⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5328 --field-trial-handle=1968,i,14611487652936271280,2774927841767142760,131072 /prefetch:12⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 --field-trial-handle=1968,i,14611487652936271280,2774927841767142760,131072 /prefetch:82⤵PID:1148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3208 --field-trial-handle=1968,i,14611487652936271280,2774927841767142760,131072 /prefetch:12⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5592 --field-trial-handle=1968,i,14611487652936271280,2774927841767142760,131072 /prefetch:12⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4704 --field-trial-handle=1968,i,14611487652936271280,2774927841767142760,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
720B
MD5fd2410e4af183b1bea14a1d319b229b5
SHA1de22348cd43408c5ff1450aaf79996fe737aa9d1
SHA2569961301e4ef7dc948d16561d3800bfb4fe1fd8f0a473892a50ef0338a5b6fe20
SHA512c2667d6be6f0512d9aee8ad86fc1269183135dac4c67c61e07ae3a85440227020e466a549c040d0ed022aefe77bed1341e952c8674a619b42f079d1a0d09c03b
-
Filesize
1KB
MD50cddc950134107385b74787e8f0fb3b1
SHA19207c7cb2db535f4399683e1d3db9faf7239b943
SHA25646e4bf2981598a7726dc4a94dbea75d1aec8e5d241bd7120de701fef747fbe1d
SHA512fe334ede805fa9eb0c0b249898ff59632128b84dd15922d74ec4a39a353a22adc4f7397734bdaf32a12fd7568cc329a92c572e7cd3831cbd9110feade4115922
-
Filesize
4KB
MD56e6fec84f1a140e5bc1ff952796a69d4
SHA1ea1c2fbc9b7ae1933c0fd9ea29393577c490a8a3
SHA2560711bbc956d3f6d8d505aff51aadc8f19e47724476118a8110cedfbde1bc4566
SHA512b1d86975500bee54f21e3c558e7700883d18fa65d57fc957d1d368740c60a51c8eb901d93b679e61a4a9c7e4156f2874634bf5a90f5a863a0de51b7b6bdb6001
-
Filesize
1KB
MD5dfdca3a50fc6758328cc05dd71d01a91
SHA104a204a0244986b20269d496b33217a9844c98fa
SHA2566a9aaab4bd13ba0b0a1ba9cb3dba7d19cc21f6010162e23c0c92b04f896e13f7
SHA51293fbc51ec893dbb6dc9ecdac029434d21e04d77ad578d205bf74b6fee73ef7f87dce7aa53ee83a797d94419e147c00f46528264d5b4acc1b237d6511121c6e8d
-
Filesize
2KB
MD53f7b1ae00c60cfec67894b723280c5c2
SHA11c976a303311c41193964c1799a0c03a7462641d
SHA256cba50fd9c7f037a64714d016a8a3eab36a64c97dc6e7ac08ebe47d308ef41646
SHA51272ffd31cf67e995c765e4158b2d5270bd17522503abc46e4b65812358370f1a7af4c43309d1963b137495c9521f197fc33c5acf4f2530259729393df071b749a
-
Filesize
6KB
MD5cab7d73050891645f5605e18390dac2a
SHA1384b9a7339ef5e9767b77f4b4e5cbd18462d1548
SHA256a39b09926a8b499f9838beb1ab711bebcb8b13e0d03e030e1e19d7c04117b652
SHA512ac2d32b8b5547cd5dfa752ae6b63cb68e669bd7911b25702c0b2e8d91449bf6a51bef2dcb000c43b5cd231e168613ec0e6062c41e94872367a24e29b96d92132
-
Filesize
6KB
MD5e94b20991c023e5f59329b1407ec939b
SHA160da4dcdc2dac4d86904e6318ddff26cc92e23b5
SHA2567a3ffe5d7d1d01ce455dc0544625865d163c6019b2f9a1ba7970b8b7a8005837
SHA5123a8ad9b72bdc427ff06980be8833664f4e6b50f01bfd16871c0b026a2dff4498793f04167a13142b98ee23d4a89be7795af780e580006a930f578474bc61e05a
-
Filesize
114KB
MD5d1d417dda5a061d9a37e540c349203eb
SHA1624f5e507eb3245d80c0418ed2f39fa986d5925f
SHA2568c42d56bba1079a2ae8a439684e4b3b1ce4fd112352f40f071415ac4ef5249dc
SHA51215525a07e930185aefb605685d2cb8db1ea954f86f801526496d1c9a8e48a8c3da43e71c956553b420c9f04f886f022f974413dd657d312c5b07f1f331420023
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd