Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/08/2024, 02:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://discord.com/channels/@me/1276721192165834784/1276724256201375845
Resource
win11-20240802-en
General
-
Target
https://discord.com/channels/@me/1276721192165834784/1276724256201375845
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 discord.com 5 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2227988167-2813779459-4240799794-1000\{BB5674DD-AAF4-4D4E-AD41-8C1493574797} msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 4212 msedge.exe 4212 msedge.exe 1300 msedge.exe 1300 msedge.exe 4224 msedge.exe 4224 msedge.exe 2936 identity_helper.exe 2936 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4212 wrote to memory of 124 4212 msedge.exe 81 PID 4212 wrote to memory of 124 4212 msedge.exe 81 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 2556 4212 msedge.exe 82 PID 4212 wrote to memory of 1488 4212 msedge.exe 83 PID 4212 wrote to memory of 1488 4212 msedge.exe 83 PID 4212 wrote to memory of 2748 4212 msedge.exe 84 PID 4212 wrote to memory of 2748 4212 msedge.exe 84 PID 4212 wrote to memory of 2748 4212 msedge.exe 84 PID 4212 wrote to memory of 2748 4212 msedge.exe 84 PID 4212 wrote to memory of 2748 4212 msedge.exe 84 PID 4212 wrote to memory of 2748 4212 msedge.exe 84 PID 4212 wrote to memory of 2748 4212 msedge.exe 84 PID 4212 wrote to memory of 2748 4212 msedge.exe 84 PID 4212 wrote to memory of 2748 4212 msedge.exe 84 PID 4212 wrote to memory of 2748 4212 msedge.exe 84 PID 4212 wrote to memory of 2748 4212 msedge.exe 84 PID 4212 wrote to memory of 2748 4212 msedge.exe 84 PID 4212 wrote to memory of 2748 4212 msedge.exe 84 PID 4212 wrote to memory of 2748 4212 msedge.exe 84 PID 4212 wrote to memory of 2748 4212 msedge.exe 84 PID 4212 wrote to memory of 2748 4212 msedge.exe 84 PID 4212 wrote to memory of 2748 4212 msedge.exe 84 PID 4212 wrote to memory of 2748 4212 msedge.exe 84 PID 4212 wrote to memory of 2748 4212 msedge.exe 84 PID 4212 wrote to memory of 2748 4212 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.com/channels/@me/1276721192165834784/12767242562013758451⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9d7d13cb8,0x7ff9d7d13cc8,0x7ff9d7d13cd82⤵PID:124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,11559607693256713419,13727377426855805999,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,11559607693256713419,13727377426855805999,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,11559607693256713419,13727377426855805999,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,11559607693256713419,13727377426855805999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,11559607693256713419,13727377426855805999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,11559607693256713419,13727377426855805999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1924,11559607693256713419,13727377426855805999,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4128 /prefetch:82⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1924,11559607693256713419,13727377426855805999,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1924,11559607693256713419,13727377426855805999,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1924,11559607693256713419,13727377426855805999,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5092 /prefetch:82⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,11559607693256713419,13727377426855805999,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,11559607693256713419,13727377426855805999,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,11559607693256713419,13727377426855805999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,11559607693256713419,13727377426855805999,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,11559607693256713419,13727377426855805999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,11559607693256713419,13727377426855805999,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,11559607693256713419,13727377426855805999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53e2612636cf368bc811fdc8db09e037d
SHA1d69e34379f97e35083f4c4ea1249e6f1a5f51d56
SHA2562eecaacf3f2582e202689a16b0ac1715c628d32f54261671cf67ba6abbf6c9f9
SHA512b3cc3bf967d014f522e6811448c4792eed730e72547f83eb4974e832e958deb7e7f4c3ce8e0ed6f9c110525d0b12f7fe7ab80a914c2fe492e1f2d321ef47f96d
-
Filesize
152B
MD5e8115549491cca16e7bfdfec9db7f89a
SHA1d1eb5c8263cbe146cd88953bb9886c3aeb262742
SHA256dfa9a8b54936607a5250bec0ed3e2a24f96f4929ca550115a91d0d5d68e4d08e
SHA512851207c15de3531bd230baf02a8a96550b81649ccbdd44ad74875d97a700271ef96e8be6e1c95b2a0119561aee24729cb55c29eb0b3455473688ef9132ed7f54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD589a436140aa8153a8309a34bba51a6cd
SHA1d49bc3d64a50a3215556624150deb6739f9e1b79
SHA2562f9edb7e571bb09427f94c3f4602bf3346c5927029cca5475403e0152596ec68
SHA5123aa26eead8357273e9dd3ee2d46874d5a6334e5052674adc759d9cfe7688a528e24e4f9138e0b356a903cc18a4c4e8885ff355f0e4843ecc42d15a4df634968b
-
Filesize
5KB
MD5fe0ee567e1ca959fd88db33aa66b0635
SHA195a57f0246766492950fd6688e711fbbd1799867
SHA2569ff1f812f9c66e21d5051b2e779817167c6c1c3177f2ceb0bd9818db78cd5b79
SHA5123708db67f9931e5bf1ed512437d1bd4853ec61e53ef7a6c9eeec0f2387c5664eff9ad32ea5e284a31da7ebd32d22efb77b4185f46b525fcd86216fdc98b25b4c
-
Filesize
6KB
MD57779042e62b49ee543f77914c387e81a
SHA10049353503b16c0ab11e3621dce5f0519c1bd519
SHA25699aadb07f11454733b0b9f9889ba4926648e36a8531511e68ff09c5260c74d7f
SHA51257d7cc8d444778546b16ed252b606f4651f624c756106217612de221264a8ff705f0af7dbdeb35c4cf73824f478dfaf8c34f3642ea9c2b7f6e2c47ab1a40342c
-
Filesize
6KB
MD5e50776c33cca7bba2020f6cae12b0699
SHA1e7f91b7cc85e539f008b3acd98b14edc28da5ea2
SHA2567339ee36af153cfc3ec4986d5aa3eb86b6bf1531c9f34fe73ed7068fc711aee2
SHA512a09401c3ee224d5f59e701710063b54a6a41af0666f7c9440499a098df9c711455654260e1e99c3cacc261f264f44dd122d2cb2cbc649c256872a483dac6fdee
-
Filesize
370B
MD512471a487c8fc033544b618d1c4cda06
SHA1593f4a686438f78b9b017fed2b4c1ac55108fd8e
SHA2564ea725dc1e1c8815e1cbdf172af7350b2b226abf4aa68072a206c11ca82a2c63
SHA5128f3157ae79dea8f3cb570aae4144d07de28e387f1a3c039c19b59dfc15df70d247e5095fcd0b07c9ef0edbeec52005a98ba962d12f4cfa936c6fa5bd6be26160
-
Filesize
370B
MD5551de03df20520bcccd3717b72e9ca9f
SHA1537aac1808a7cc77bde094b5db50a8a290b06455
SHA2563826c2e9d9288d8dc3a824a3c213860f427bbd20931c5f2b2c600b5bcaa38fdd
SHA512a44326df97dbb2526c071f6fd1a074991c0a5edb13e55dc7cfb46a08bca74291bd0ebecac209d574b1d194e97b4459e2f61584221d26ea8fe74e535be3e179a8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD52bc30e6555de49b7eb675863bc9c61e1
SHA1ac05f76aba30760cc0855ccc257750c6ed1e1d81
SHA256990f93fae6ef4e4c82a6bbca459bf6647c1dcb0e3e464f6bffb58d4e87b21610
SHA512164cc9bce8b85bf9db342f70d263ab031b62290e8352192a10fb7ed13421f92266b11666d2a23edd49d11fc4451354f9e9930db4ff64f99c7bb13f9071819396
-
Filesize
11KB
MD57b4021a22832e740a1377c16eccb796f
SHA1b8dea302bfc7eca4840296bcd340e7a262196243
SHA256b81638a208e176da2f21bb68d8f2a48a6ac390447358752ccc2a823b6e171192
SHA5127e60e024f114946a849d167ab1975c8403b9d7b1037b7991c56c87b6b30852cab495c86ce307e8844693c21af020daec6c810f11853e8eb0583877d0192d14cb