Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 16:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://arxiv.org/pdf/2303.08774
Resource
win10v2004-20240802-en
General
-
Target
https://arxiv.org/pdf/2303.08774
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133684715499849945" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4748 chrome.exe 4748 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe Token: SeShutdownPrivilege 4748 chrome.exe Token: SeCreatePagefilePrivilege 4748 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe 4748 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4748 wrote to memory of 3028 4748 chrome.exe 84 PID 4748 wrote to memory of 3028 4748 chrome.exe 84 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1156 4748 chrome.exe 86 PID 4748 wrote to memory of 1424 4748 chrome.exe 87 PID 4748 wrote to memory of 1424 4748 chrome.exe 87 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88 PID 4748 wrote to memory of 2968 4748 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://arxiv.org/pdf/2303.087741⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff3b09cc40,0x7fff3b09cc4c,0x7fff3b09cc582⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,17216758777820634202,5043364824183834548,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1896 /prefetch:22⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,17216758777820634202,5043364824183834548,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,17216758777820634202,5043364824183834548,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2400 /prefetch:82⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,17216758777820634202,5043364824183834548,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,17216758777820634202,5043364824183834548,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3680,i,17216758777820634202,5043364824183834548,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3660 /prefetch:22⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --pdf-renderer --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4664,i,17216758777820634202,5043364824183834548,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4940,i,17216758777820634202,5043364824183834548,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4796 /prefetch:82⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3228
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD54d67273d2d6a76bb9e4c13ebef9671a3
SHA112bf762c67dffc36dac8d083acf281119d9cc659
SHA25640842a085b62bcb215b8b66a98693e6fdb89e9fc06f00e4718b847c1e8ee3da1
SHA512a46bf03b223efbcc4f374a0aa90728ca757bf0e04811bec4c56cb1c8da79770d72446825e39ed1de258baa5a22d86df3ff82b2ea100a45e62ebfc9a2762edf1d
-
Filesize
216B
MD5fd66ca8c53414f02c3c0a882c2877512
SHA140f53dba19e05166b65c868ab7969744ccb88bfe
SHA2569b072392ad4850ef0f0e1b296365018392a239ad5cdf32613e5f6f03851e1695
SHA5122087092ca1a115e49c8e884b6030219d9f74c6b8dd1f27c5ae2c8b5dff76d22922ef3e3c59661aa9867587a96c0f92243eba4e8a3b4630b9b7c8c274fdbc5f7c
-
Filesize
1KB
MD5b0cc443fc4a6c4348f2328a5d45af6bd
SHA186a54dea9b82ea86696b87f1a193549a43372b46
SHA256fc8025114cf100c2d4a7fa7ff1785c262514ed672d1259fa766f0d46869607d0
SHA5126c996f0ea1a6b76a659ed896b8d9f8cf3068943584b344b84961688f516f4824b3d33b46620c64bb3e251cbe37bd2a828ef53215d6fc356db1bf70718b2725a9
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5bcd8620f15b87c14e0d0445fb5ec6cab
SHA1c61322960ea378645aa2961734afe5a031b0c9f1
SHA256ee84c0e070a06a5be8d8dcf7b397d5791260500702fcd720f927ae7fb9101b30
SHA5125877f4cf3aaa8f84ab366d51ec11c67b0c29ec72052d7e44d9a8b7c771328d518c05ff1f68ae7c6a170c79dca5af390201d2d3d8fcccd06925525bd08b21a353
-
Filesize
9KB
MD5bfbf9814569a0d351992cd6df6ec4c91
SHA1c54e269464ace4e64e002001b1b4fae2ee738829
SHA2561a7c827c1c9714c487aa6c89a1d3d82e68a9a2e8148d6ff9154b2daf96607831
SHA512e8cf40ae15002a9f77c7734238047c5232d20f6e2fd4f74d56e2d89062d7d8366646e4b2168a1e3f349892f1efefbe25eec18808cdd1cea62e5032b1d016a569
-
Filesize
9KB
MD5568636a599ca7e880297909d1cf3e880
SHA11ced39cdd285f858e227b1dcf4ce43ec6af47282
SHA256649d23f7ad7aac9fb83dd7b1e5504e17744dc360b45b4c26e3162645374aeae8
SHA5121392e7abddf1dd68f54600b54ed3ff15528280a33dc99b7afc3f330bdb6763b3c39a122ba2174ee061aa23c75a46290ad5e9473a0f00907aad6d1e311a1c9e48
-
Filesize
9KB
MD56c0723f194cd31f35247be1f7e5c7c9f
SHA17e3f31b53105d8f4426f99d00331c205472b2a86
SHA2565f81b18f4658c83626ac91c1591871f786a05523d8dffd1482ddf45568852b7e
SHA512a46a4cc26d8870ebdafcde34ca5306c23e24c6db57dd319e419dd40861d1d31f174d0f8224963e80aea87881b72f2037dc5978ff41f821132f937455b8845546
-
Filesize
9KB
MD5b74f2fab22c1fad2794cf05642596eef
SHA132c9bc38b6266c0a19cbd51f2803bb4ae7322f22
SHA256a2a2a028b3ad8ca546b09dcd19ef361ecc35ebdd445efad4dd0bca0f0d9f148b
SHA512fe3c0afd624682e1897ebfdf1e32ead4e271be550f2c43dc3724b2d41501a1b16e988d66e8f113ae6eaa9cda309a6a51b9fb7a67f53c732ef5f59325c324de60
-
Filesize
9KB
MD5442c4d3467b496064d3268875fc38072
SHA1755cf0bccf006caba2a784e105186d738f669f08
SHA2566cbf6b6bb25771663624053747e988b772dc0a4e440ad37ac2ea7f2046ddb1e1
SHA51200e55ca73795aa55146dd322bce85b7e643c5b5b4eefb1ca2b0da28f2a375c21011e389f9e6aa512ea4ccfe15515be895f4b60a28bb3b33dc1f18d6f668876aa
-
Filesize
9KB
MD502a869939fd72d3a721eeaef8e3a12d7
SHA1d61e1ba41c064230732028e470d4a3a5fa68f192
SHA2562487d5fa216bcdb27785b7acc3330e0fd6182cd428be89b6b22cec4645526e73
SHA5120df6c2bf0e65aa95e964e18ca2cd5b14ae0a3253396ee44003a595d05183d2563a9d589456cf721ecf4d35a36e61f99cbc57490d7049b83a7fd964a0e68b2b4d
-
Filesize
9KB
MD548e9325981dbbc27baf8444313e071b9
SHA1096c31113f7fb93e14a1040792aa6b97031aec5a
SHA2567f7c8768ec97688e0e2b0403d59d2f4f027e792870fc8baa2a75d60686877170
SHA512fbd996848eab45d8c8d8816ad70f10ddcc9177e4914f30a95a61db5861eee13363f63a996a75dd96e9913a83a6a9f68bc0f80fcc70b2cde52fb1e66ad3ba66e8
-
Filesize
99KB
MD5ce286a25cbe48a2086e1a4f30971d178
SHA167c08390fec0cf3ad660edbff5723ef83be35696
SHA25658eb4c50d41ac82f69115b83a90f0a82bf286fd49fcb605d088aef57f142a1f3
SHA51272c675889dd98a249412e1b47a30e1f35797faa3d1a6b18c828e2bd4f25e971a4896b7bc5da12c18d1d16a3e3d83495012679d444ac779d3154230d106a35f4f
-
Filesize
99KB
MD570e89dbeb5139993f11073428c2aed51
SHA19ec41454c1926460d4855371943d44e74ef32d92
SHA2563a47984ab5b507ab7a48de2165d5e1544339f264a3bb434246f5e3099428b7f6
SHA51261d07e3f20d2c3744ebd13110353985d9455c949fe8275a406e788441a976d84078435422f2d3a1664b6e5fec87bacfc35b0ece9dd8262174b935c247025ebdf