Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
109s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/02/2024, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
d3d10.dll
Resource
win11-20240214-en
General
-
Target
d3d10.dll
-
Size
1.4MB
-
MD5
ac91742846662225980dd7c72e18e457
-
SHA1
87892802506391cbaca530cef6a5a3bbdf55ca41
-
SHA256
176f30a2ba45c662b5a2dd1ca497be5187803dde5148558465f35efb20a7f8ca
-
SHA512
f9b7e850b0fa863083152d80ceda6207adba1aa884c7d10132b6548fa8c772b5002fee09a78d7386845411bf880981feb3aba5805741a5151a4034eb5c77108f
-
SSDEEP
24576:bp7ql2BWMvC4UDOcv1IQNun57eM2Fnaptl7do60OegX7AoZBqC:LBW6C4qjSosnsnadD0ErvZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133529203663606986" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-751003968-2436847326-2055497515-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4620 chrome.exe 4620 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe Token: SeShutdownPrivilege 4620 chrome.exe Token: SeCreatePagefilePrivilege 4620 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe 4620 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1856 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4620 wrote to memory of 2740 4620 chrome.exe 86 PID 4620 wrote to memory of 2740 4620 chrome.exe 86 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 652 4620 chrome.exe 88 PID 4620 wrote to memory of 332 4620 chrome.exe 90 PID 4620 wrote to memory of 332 4620 chrome.exe 90 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89 PID 4620 wrote to memory of 3380 4620 chrome.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d3d10.dll,#11⤵PID:1600
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1856
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\Admin\Desktop\SplitWait.shtml1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9dbf39758,0x7ff9dbf39768,0x7ff9dbf397782⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1780,i,7825622984110266021,10668342935382391025,131072 /prefetch:22⤵PID:652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1780,i,7825622984110266021,10668342935382391025,131072 /prefetch:82⤵PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=1780,i,7825622984110266021,10668342935382391025,131072 /prefetch:82⤵PID:332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=1780,i,7825622984110266021,10668342935382391025,131072 /prefetch:12⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3172 --field-trial-handle=1780,i,7825622984110266021,10668342935382391025,131072 /prefetch:12⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3960 --field-trial-handle=1780,i,7825622984110266021,10668342935382391025,131072 /prefetch:12⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4700 --field-trial-handle=1780,i,7825622984110266021,10668342935382391025,131072 /prefetch:12⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 --field-trial-handle=1780,i,7825622984110266021,10668342935382391025,131072 /prefetch:82⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1780,i,7825622984110266021,10668342935382391025,131072 /prefetch:82⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4836 --field-trial-handle=1780,i,7825622984110266021,10668342935382391025,131072 /prefetch:82⤵PID:440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3844 --field-trial-handle=1780,i,7825622984110266021,10668342935382391025,131072 /prefetch:12⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3664 --field-trial-handle=1780,i,7825622984110266021,10668342935382391025,131072 /prefetch:82⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
369B
MD5267e98e392a9953ac07c4735112dce9a
SHA1a5ac4d8d7ce85d2341ef239c24566f7256d7d5c8
SHA2568c7489d9202dfba6e83d69cf36b5df5c6aae9b2f0733cc55c36d3266040b46f0
SHA5126a9a15cd2caaa2028c091210fa34ebb842bcef6bf4572f2e7a92e1a63165a864d8a41a2f45db1aebcad37ed86f9d9c5e7a58c350dc32d4890943403e84dea17c
-
Filesize
6KB
MD58afc48a950469a4a1526481925092b3d
SHA1b6facbe1f3fa73e61f4c9cddc86485d780425562
SHA25647dae0d906469e151ce87d0419e3d739563badd01c5a95804667e9e47f18f276
SHA512d348e729b8d0e30a00dcbb1c52b0c38460502c6f595ea089c5f03bb2f723364d7498f714a0fd59ba04078fe2daefee2bcdcceeabf70f90eb89a73db0a932b4f7
-
Filesize
6KB
MD5a1d95377822b4278e1bfa89f44aa45be
SHA150ce7b248aa6e2874112d84bc189a93b0f5d74ee
SHA256e777671d79afc781c0f1479f9691f5b728c3bc06bd0c31dbadf82ad2a95f9527
SHA512a35cbe5bdb421962ee2db72e60ff72986a1425c7cee1015f03f20b6fc20c57fe2223f6ec5c4e302004c45d96a6225acf3fe522bdd2f115f36d6f45050f2de2a5
-
Filesize
15KB
MD57cc93ff8efb263baa473f4aa26bb367f
SHA12280ad4230df8247c4713413b4ac953ddcdc8f7f
SHA256d13287a4de75fa3a7193d527d9a1283dbb94d31cc5e18b63dd483b366a6f24b3
SHA5127b5e44862c582cc5a79d9e085e9a4c9ea7679308349461300eb9ac9e73f88d1e679479c54eb83e5a084c1a0d63efd4da0d8e1dee948f2418abcdd4043e8709e6
-
Filesize
255KB
MD5a29eedec883f216b4ba716dd4a5a5572
SHA166fbfbe8432b7cb56a3bd37e5d096c7519f1c806
SHA25624647886d677aa7ec30f2270c1855745d22a36134d3b8aa1514bf101889dbd11
SHA5120fc45e197e583d02f409c7c5c3b51fddabe306565d5b1622ef65a443fd7f44474e0e59de62e187261c956bc82e2905f28e3b4debfb8be4ffa4b1524dabdba1bb
-
Filesize
255KB
MD5db5cdd1b07a8c2bc13ab2603b63cb762
SHA18fc091118dd9731320c9faf2dae6de4d2712be83
SHA256608785e12b52774e08b6ae1a21126413d3cd90f3c6c4cd12f3777fdad3ce75fa
SHA512a9d423abf60ffca86ab85f7e3a173b919ae39cb5d77ff9089219ab2d9dd7fb3ce879bc5073be5bb4d7f274b75c69ef412d789924722504b361049f322f853ef9
-
Filesize
91KB
MD584e555df843f081c755c7fb180f22fa3
SHA1ad761ef07338d38758e1266cf66f27ec2aefd372
SHA256e686fb5e005060cc80060e508461b33d50a4193aae36882b6b5bb739f5b70b4b
SHA5125f6533144f84ad67ec60bc0c4f5c5afd92c07680e06087319c9fd2c11221c1b57fa4737e4945523f66a10216a9d82daa6cdeea4a0332a41cc16566f4c73d5f41
-
Filesize
89KB
MD5b85d75a1e291732f4f9c19343a3761af
SHA1f92ebdfa8e5d452b004237ab37f61042b65bcacc
SHA2563a227b95d0026a1193da0cadff5cb194ea723bc509687a2655ec903901dcc972
SHA5123baf4a1318545c3ba44d74a95c477259d63a3e894e31a44fa8fee0839883eb30f3389500172f1d39eca475e4652c8b9dc294086604a0cd09fd0a6006767fea5c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84