Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20240404-es -
resource tags
arch:x64arch:x86image:win10-20240404-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
21/08/2024, 18:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mas.sv/gXMOEO
Resource
win10-20240404-es
General
-
Target
https://mas.sv/gXMOEO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133687388147983990" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2652 chrome.exe 2652 chrome.exe 3588 chrome.exe 3588 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe Token: SeShutdownPrivilege 2652 chrome.exe Token: SeCreatePagefilePrivilege 2652 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe 2652 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 4884 2652 chrome.exe 72 PID 2652 wrote to memory of 4884 2652 chrome.exe 72 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 3500 2652 chrome.exe 74 PID 2652 wrote to memory of 1012 2652 chrome.exe 75 PID 2652 wrote to memory of 1012 2652 chrome.exe 75 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76 PID 2652 wrote to memory of 3644 2652 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mas.sv/gXMOEO1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd63019758,0x7ffd63019768,0x7ffd630197782⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1564 --field-trial-handle=1856,i,16594422170916591064,2588453908377964045,131072 /prefetch:22⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1760 --field-trial-handle=1856,i,16594422170916591064,2588453908377964045,131072 /prefetch:82⤵PID:1012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2084 --field-trial-handle=1856,i,16594422170916591064,2588453908377964045,131072 /prefetch:82⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2860 --field-trial-handle=1856,i,16594422170916591064,2588453908377964045,131072 /prefetch:12⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2872 --field-trial-handle=1856,i,16594422170916591064,2588453908377964045,131072 /prefetch:12⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3856 --field-trial-handle=1856,i,16594422170916591064,2588453908377964045,131072 /prefetch:12⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3144 --field-trial-handle=1856,i,16594422170916591064,2588453908377964045,131072 /prefetch:12⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4228 --field-trial-handle=1856,i,16594422170916591064,2588453908377964045,131072 /prefetch:82⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4336 --field-trial-handle=1856,i,16594422170916591064,2588453908377964045,131072 /prefetch:82⤵PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4164 --field-trial-handle=1856,i,16594422170916591064,2588453908377964045,131072 /prefetch:12⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3864 --field-trial-handle=1856,i,16594422170916591064,2588453908377964045,131072 /prefetch:12⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4660 --field-trial-handle=1856,i,16594422170916591064,2588453908377964045,131072 /prefetch:12⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4644 --field-trial-handle=1856,i,16594422170916591064,2588453908377964045,131072 /prefetch:12⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3600 --field-trial-handle=1856,i,16594422170916591064,2588453908377964045,131072 /prefetch:12⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=692 --field-trial-handle=1856,i,16594422170916591064,2588453908377964045,131072 /prefetch:12⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1856,i,16594422170916591064,2588453908377964045,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=1728 --field-trial-handle=1856,i,16594422170916591064,2588453908377964045,131072 /prefetch:12⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5766a80f149bd9017fc2bc2c52a3f99c7
SHA14e7b953f971b1966f734243e6a5e3229b46d91ae
SHA2568e145975d6dc6eb82714baba828c2f35a498e20f70a093483cdaa78f6175a9a2
SHA512cc7a0d6cac5bac631e8de757463b76d73f92bbd84a4b032f4e496881e20260add33f4ec8fda675359c77a695bb2207d082380b58ca66bf40a289ef9b9a3e1438
-
Filesize
5KB
MD57b45123b8e25a64d027343b18e95955a
SHA1c819f48640367f96864a3a062790132df68d3175
SHA25622a63d3342596f1123a3beb897c9d0c79fdf712a7c3b61cdeee1b95086252ffd
SHA512feaadc5005e4cf0a6d397668d5abc55090a06b47d9913f26cee72b7abba082bdb0eeea5ad09bb9865e434e153827fd26995a6688106c2a40a8d8a5306a11f197
-
Filesize
5KB
MD569bfc78367cf1e04a78aeb752c8a109d
SHA1391ecd2c93566af3ab5fa8089c60536690de6211
SHA2561793a69fb0da90ea8c66ab6ad110217bd9361d9eebd2662aaa23f01702655cd8
SHA512ed205e70f3b915237c31f49eb629eabc523e1155f75bc6a9d92b2f1f47b83fa8189645cddd7bafb6139c40a5bf313c3df068989527731803ecf436131eb1eaf1
-
Filesize
136KB
MD526b00679800c97f2bd3581a86b8cb1b1
SHA1b64f6c22c1cda15e4847e4d2dbca05ab8872b7bf
SHA256ca3806cda78ac49d4d9489f434bff4e0ece1bb23a9d124e454c056f155fe051d
SHA5121ee175416f6793fd09ac9fe9a3b4aca74761d2711e0d9cd09a1e8f7227557111666cde5aea20abb4dc71ae2bc52dc404088c207b442065e796f1358c819ed418
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd