Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
5Static
static
3Microsoft....re.dll
windows7-x64
1Microsoft....re.dll
windows10-2004-x64
1Microsoft....ms.dll
windows7-x64
1Microsoft....ms.dll
windows10-2004-x64
1Microsoft....pf.dll
windows7-x64
1Microsoft....pf.dll
windows10-2004-x64
1Newtonsoft.Json.dll
windows7-x64
1Newtonsoft.Json.dll
windows10-2004-x64
1Zorara.dll
windows7-x64
5Zorara.dll
windows10-2004-x64
5ZoraraUI.exe
windows7-x64
1ZoraraUI.exe
windows10-2004-x64
1ZoraraUI.exe
windows7-x64
1ZoraraUI.exe
windows10-2004-x64
5ZoraraUI.e...re.dll
windows7-x64
1ZoraraUI.e...re.dll
windows10-2004-x64
1ZoraraUI.e...pet.js
windows7-x64
3ZoraraUI.e...pet.js
windows10-2004-x64
3bin/Monaco/index.html
windows7-x64
3bin/Monaco/index.html
windows10-2004-x64
5bin/Monaco...ain.js
windows7-x64
3bin/Monaco...ain.js
windows10-2004-x64
3bin/Monaco...bat.js
windows7-x64
3bin/Monaco...bat.js
windows10-2004-x64
3bin/Monaco...fee.js
windows7-x64
3bin/Monaco...fee.js
windows10-2004-x64
3bin/Monaco...cpp.js
windows7-x64
3bin/Monaco...cpp.js
windows10-2004-x64
3bin/Monaco...arp.js
windows7-x64
3bin/Monaco...arp.js
windows10-2004-x64
3bin/Monaco...csp.js
windows7-x64
3bin/Monaco...csp.js
windows10-2004-x64
3Analysis
-
max time kernel
47s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/09/2024, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
Microsoft.Web.WebView2.Core.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Microsoft.Web.WebView2.Wpf.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Newtonsoft.Json.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Zorara.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Zorara.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
ZoraraUI.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ZoraraUI.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
ZoraraUI.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
ZoraraUI.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ZoraraUI.exe.WebView2/EBWebView/Speech Recognition/1.15.0.1/Microsoft.CognitiveServices.Speech.core.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
ZoraraUI.exe.WebView2/EBWebView/Speech Recognition/1.15.0.1/Microsoft.CognitiveServices.Speech.core.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
ZoraraUI.exe.WebView2/EBWebView/Subresource Filter/Unindexed Rules/10.34.0.54/adblock_snippet.js
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
ZoraraUI.exe.WebView2/EBWebView/Subresource Filter/Unindexed Rules/10.34.0.54/adblock_snippet.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
bin/Monaco/index.html
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
bin/Monaco/index.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
bin/Monaco/vs/base/worker/workerMain.js
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
bin/Monaco/vs/base/worker/workerMain.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
bin/Monaco/vs/basic-languages/bat/bat.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
bin/Monaco/vs/basic-languages/bat/bat.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
bin/Monaco/vs/basic-languages/coffee/coffee.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
bin/Monaco/vs/basic-languages/coffee/coffee.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
bin/Monaco/vs/basic-languages/cpp/cpp.js
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
bin/Monaco/vs/basic-languages/cpp/cpp.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
bin/Monaco/vs/basic-languages/csharp/csharp.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
bin/Monaco/vs/basic-languages/csharp/csharp.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
bin/Monaco/vs/basic-languages/csp/csp.js
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
bin/Monaco/vs/basic-languages/csp/csp.js
Resource
win10v2004-20240802-en
General
-
Target
bin/Monaco/index.html
-
Size
10KB
-
MD5
5f200b725ef76b473cecbb5d452d849b
-
SHA1
6f42fc7a947a489f7d74370efce6bca7c7cf7240
-
SHA256
fd084fc0daecfef0a6f6b89b4e1ad542e508c0003f2debf07aa3eeb725ccb6c8
-
SHA512
fc350662fdf0e9d36cc842cbde94e035c0c51874993292543595a5b104112fd600a17d37e30a0d625fde6d338cbec05545e830b161b69e5e74c3244bc436a4d8
-
SSDEEP
192:yC5GCW9bvbQ3QJW5MDQiVKLkcmc/VT+9taAc4dReigX2:LGCW91k5MciVQ2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 888 chrome.exe 888 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 888 wrote to memory of 2220 888 chrome.exe 29 PID 888 wrote to memory of 2220 888 chrome.exe 29 PID 888 wrote to memory of 2220 888 chrome.exe 29 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2992 888 chrome.exe 31 PID 888 wrote to memory of 2052 888 chrome.exe 32 PID 888 wrote to memory of 2052 888 chrome.exe 32 PID 888 wrote to memory of 2052 888 chrome.exe 32 PID 888 wrote to memory of 2868 888 chrome.exe 33 PID 888 wrote to memory of 2868 888 chrome.exe 33 PID 888 wrote to memory of 2868 888 chrome.exe 33 PID 888 wrote to memory of 2868 888 chrome.exe 33 PID 888 wrote to memory of 2868 888 chrome.exe 33 PID 888 wrote to memory of 2868 888 chrome.exe 33 PID 888 wrote to memory of 2868 888 chrome.exe 33 PID 888 wrote to memory of 2868 888 chrome.exe 33 PID 888 wrote to memory of 2868 888 chrome.exe 33 PID 888 wrote to memory of 2868 888 chrome.exe 33 PID 888 wrote to memory of 2868 888 chrome.exe 33 PID 888 wrote to memory of 2868 888 chrome.exe 33 PID 888 wrote to memory of 2868 888 chrome.exe 33 PID 888 wrote to memory of 2868 888 chrome.exe 33 PID 888 wrote to memory of 2868 888 chrome.exe 33 PID 888 wrote to memory of 2868 888 chrome.exe 33 PID 888 wrote to memory of 2868 888 chrome.exe 33 PID 888 wrote to memory of 2868 888 chrome.exe 33 PID 888 wrote to memory of 2868 888 chrome.exe 33
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\bin\Monaco\index.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb0e9758,0x7fefb0e9768,0x7fefb0e97782⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1108 --field-trial-handle=1272,i,7281016112397333413,17322498508029695847,131072 /prefetch:22⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1548 --field-trial-handle=1272,i,7281016112397333413,17322498508029695847,131072 /prefetch:82⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1272,i,7281016112397333413,17322498508029695847,131072 /prefetch:82⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=980 --field-trial-handle=1272,i,7281016112397333413,17322498508029695847,131072 /prefetch:12⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2332 --field-trial-handle=1272,i,7281016112397333413,17322498508029695847,131072 /prefetch:12⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1492 --field-trial-handle=1272,i,7281016112397333413,17322498508029695847,131072 /prefetch:22⤵PID:1100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3288 --field-trial-handle=1272,i,7281016112397333413,17322498508029695847,131072 /prefetch:82⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD585ebaaafe0a50785b8a9f631679b1bae
SHA16b2b653646fc4c2639691eb0d23a1a5ceccb2f4e
SHA2566b42a5bddcd449ca1c769b186189d9abd15f6bf3265415101af29a4f180ee7a7
SHA512afb400a9b52293dba08b260eeaf4e21655ae2a5e3f2282ff3c46976f20ae0fcc471b0604d88b2d0ace4491bd2a4f4806e731f90ddd21876a476adbb0e16cff2b
-
Filesize
4KB
MD52c6e5ab71a46641b5b380f85459993d0
SHA12af843523b607898c4da657b24b7307f5456d871
SHA256d1d2e705807efe8be4244630cf3f83d91c7038b2b29ad842e00bc1416da27797
SHA5123eaf1b4293913b71b5b17575efc993d814766d08627a1ce445e6657bf2ce866faba74bf4a9ef97548c13d50d7f0e590cbe0e6527acc3fdc33e5fe158284da3f9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2