Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
331s -
max time network
330s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2024, 17:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://secure.rightsignature.com/signers/30faab41-6fbe-4b55-b1d4-d146bae1d4b7/sign?identity_token=C-PS12ixzzzv-QUqXWGk
Resource
win10v2004-20240226-en
General
-
Target
https://secure.rightsignature.com/signers/30faab41-6fbe-4b55-b1d4-d146bae1d4b7/sign?identity_token=C-PS12ixzzzv-QUqXWGk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133582818722062323" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1804 chrome.exe 1804 chrome.exe 4988 chrome.exe 4988 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1804 wrote to memory of 3800 1804 chrome.exe 90 PID 1804 wrote to memory of 3800 1804 chrome.exe 90 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 2352 1804 chrome.exe 92 PID 1804 wrote to memory of 1852 1804 chrome.exe 93 PID 1804 wrote to memory of 1852 1804 chrome.exe 93 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94 PID 1804 wrote to memory of 4348 1804 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://secure.rightsignature.com/signers/30faab41-6fbe-4b55-b1d4-d146bae1d4b7/sign?identity_token=C-PS12ixzzzv-QUqXWGk1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe6e939758,0x7ffe6e939768,0x7ffe6e9397782⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1884,i,8539007545976403652,17841052210155343261,131072 /prefetch:22⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1884,i,8539007545976403652,17841052210155343261,131072 /prefetch:82⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1884,i,8539007545976403652,17841052210155343261,131072 /prefetch:82⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2880 --field-trial-handle=1884,i,8539007545976403652,17841052210155343261,131072 /prefetch:12⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1884,i,8539007545976403652,17841052210155343261,131072 /prefetch:12⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5096 --field-trial-handle=1884,i,8539007545976403652,17841052210155343261,131072 /prefetch:12⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5212 --field-trial-handle=1884,i,8539007545976403652,17841052210155343261,131072 /prefetch:12⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 --field-trial-handle=1884,i,8539007545976403652,17841052210155343261,131072 /prefetch:82⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 --field-trial-handle=1884,i,8539007545976403652,17841052210155343261,131072 /prefetch:82⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2612 --field-trial-handle=1884,i,8539007545976403652,17841052210155343261,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1316 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:3844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5598fec1e7a1eec58fc3c7082c658df18
SHA16f2d3d4dd4c6e757b1c792689685b6da4b48e9f8
SHA256e1e645f106f927b6be424bc9b9fffe767a090ebe2023634a66079afc86ddf7eb
SHA5125e4161068c1faba875e48949658bd9f063813e46cd9512cf3ec16809b6ec247ee080ba33e9080677000409b540beafdda27148ac2fdfbf9ad3d757807721c43a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\670f667f-c339-4fa6-b3f2-ad7167df2936.tmp
Filesize1KB
MD5b15672f689a65cd00323d4012e8acd64
SHA1f394d44321b58648337d3cbaa09680581fdde21b
SHA256088ab7c284805dc058df1b7b802cf6916ebe0c00e273634bc804dbdac0648e93
SHA5129c61c377eeaa8afa5744916b125608e54109d0aa00f0a70fd9b6b0920a75ca75f874ed308f18c3605ee00fbac8b2b5634a1e2dcda6a2a10e6154a006042e93bd
-
Filesize
1KB
MD5fa02d8f66618a643a1e05f481c892db7
SHA13a6b9a4afa651eebb9339dce99077e9f2dc872b4
SHA256613ecdbd2f3ee68f0ba103047ba190956b113bb0a5aca506a47fbee685d2fc1f
SHA512cc8ef44917ae35b90737fca7a4bea3d969c5d772ba79e0ab723dc72763dad62db3b2d9240469322b02d365764b9e868af60867dc44633b4050904d28e8406179
-
Filesize
1KB
MD5bc053855983cc28dbe72c44cf7abf781
SHA160574a81c2084b1615e1c694c197850fc38dd853
SHA256b5b090abc6e1587ae0117ae174698aedffaf4ef75b1c7610beb200b53269b0f9
SHA51296d750b1214c824cdf3301bbe5d91f5d87b6b8b71613b7277d836e5fda67c2f626c9d25caf526a998b9dd0a071146df65ab24e9175a80418e998aca882015693
-
Filesize
6KB
MD5bf92993a6e0e64db4bc77ac548bec687
SHA18823a622e438d329f1c33d8281bb5b77fabef20b
SHA256324dcfc321c2dc608f72756ccce6f449a0eafc318b3bdfbc8d6f01fa8e22aa4c
SHA512b6f40d81dbe6ef09b13b9afebf8e83246e57d212201b982e8765959953047afebe5d171d4ee9b30b6936414f0df8b32ca273681ccd25d7af722053e917c13035
-
Filesize
6KB
MD51c75051a1f7582277a5bc8f8ef6eb987
SHA1a01d58258b323617866e764a27af64d09641a46b
SHA2566f8678864a562b5a9c17d1c58dc02c05f70352207b4f48e6abf600695f5da5ad
SHA5122e6fdef7f1c80eb99dcdec5553e4efca1983fa9c981e4559c24bad852453fda3b816df45adbfa77a183c55ae60d28d4775f19e1116cd11662eb595d829ade395
-
Filesize
6KB
MD56fed104014660a47579fab84517bf73b
SHA1691e671e3b94e0b440be8225a8fe5037aed51ed8
SHA256d209b2d097868cc0630cac3f0eeb13ff77e27093cf7622adce6ec5d56a2b1c1a
SHA51236566ffdd749501dd962ba98fa537ffa4fdff7cf5adab404aacca2f756257f2df907ef89f4ecbffd927baf73401c64e7ebfd044113144f0fb15ab352d19ab7e8
-
Filesize
5KB
MD55a38db34e2bc5633253a2709147ef1a5
SHA10953b97ec6a30eaec8e832ce533c1af4da4d5414
SHA2568834b9c29aa681a9b5064dba3dbee666a79574b537eceb043b2e6b2c2976e505
SHA512f92bc55ec802c5c3f40ae98faec28fc10952e0841129ce6521432a9818e7320ddd50e4460a02bf4c2974e77b8886339484d50653f9c5591e1dbf22ae88ce0df3
-
Filesize
128KB
MD5755d1498f8ed3ccb518932dcdce78651
SHA1a77df6629941ed25108a1ac01184d4ec8daf0a51
SHA2560cd469db8b0c5796a6697e0c0df07620857e9215923d707fc0933351fa679b00
SHA51259c330c7c73746992bd491e150defc75c0066205cc9e74e06d16ef952723a85e994b22c5e30bec8d9fbc103658762be1964dab16122cf7b56eea3c92974600ff
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd