Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
02/10/2024, 05:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://89.211.57.198:5061/i dvc=172.31.6.105 requestMethod=GET
Resource
win10-20240404-en
General
-
Target
http://89.211.57.198:5061/i dvc=172.31.6.105 requestMethod=GET
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133723207878202831" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2804 chrome.exe 2804 chrome.exe 4260 chrome.exe 4260 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2804 wrote to memory of 1036 2804 chrome.exe 73 PID 2804 wrote to memory of 1036 2804 chrome.exe 73 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 504 2804 chrome.exe 75 PID 2804 wrote to memory of 828 2804 chrome.exe 76 PID 2804 wrote to memory of 828 2804 chrome.exe 76 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77 PID 2804 wrote to memory of 4044 2804 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://89.211.57.198:5061/i dvc=172.31.6.105 requestMethod=GET1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff941909758,0x7ff941909768,0x7ff9419097782⤵PID:1036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1576 --field-trial-handle=1808,i,14484426773953684636,6507927524245898604,131072 /prefetch:22⤵PID:504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1680 --field-trial-handle=1808,i,14484426773953684636,6507927524245898604,131072 /prefetch:82⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 --field-trial-handle=1808,i,14484426773953684636,6507927524245898604,131072 /prefetch:82⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2704 --field-trial-handle=1808,i,14484426773953684636,6507927524245898604,131072 /prefetch:12⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2712 --field-trial-handle=1808,i,14484426773953684636,6507927524245898604,131072 /prefetch:12⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3836 --field-trial-handle=1808,i,14484426773953684636,6507927524245898604,131072 /prefetch:12⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3108 --field-trial-handle=1808,i,14484426773953684636,6507927524245898604,131072 /prefetch:12⤵PID:664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4268 --field-trial-handle=1808,i,14484426773953684636,6507927524245898604,131072 /prefetch:82⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3940 --field-trial-handle=1808,i,14484426773953684636,6507927524245898604,131072 /prefetch:82⤵PID:64
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3972 --field-trial-handle=1808,i,14484426773953684636,6507927524245898604,131072 /prefetch:12⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4424 --field-trial-handle=1808,i,14484426773953684636,6507927524245898604,131072 /prefetch:12⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4372 --field-trial-handle=1808,i,14484426773953684636,6507927524245898604,131072 /prefetch:12⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4272 --field-trial-handle=1808,i,14484426773953684636,6507927524245898604,131072 /prefetch:12⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1496 --field-trial-handle=1808,i,14484426773953684636,6507927524245898604,131072 /prefetch:12⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3896 --field-trial-handle=1808,i,14484426773953684636,6507927524245898604,131072 /prefetch:12⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2544 --field-trial-handle=1808,i,14484426773953684636,6507927524245898604,131072 /prefetch:12⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4408 --field-trial-handle=1808,i,14484426773953684636,6507927524245898604,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5d47cf93c55cd42d56c8e3bc54c070b23
SHA1cc37028d1629270d01d1546d1718e405e807462e
SHA256039bb69212b75a98aea43c0226eee922e01e5aef5f1d01dfc870ad0b2a32c9a4
SHA512adeb6429b95ac893752aaba020ab17226755f05947c1d6c7ce958bedaeca91ef8523372a9fe963b642caa891fbe938010451616e5c5a56200cdb80d0b481a0c8
-
Filesize
6KB
MD53b0d300cdd708dc5cd250c695533e244
SHA125de22847ae96c875d42e5995f768346e00b3bd4
SHA25691212442ab930c659d2021b98c6d7e3a059d06d069b9877e267e71077c261532
SHA51286a5fa4a9a9720d1df4fc9b3413bbdc80772bbd93e828d47f80eb1f6331c84264288280ede3b2fb3bd11a8e54d3c2ecf88d6e354c8b502c7ff99b2ad7246be48
-
Filesize
6KB
MD5438c45f36567010975a84418001325f0
SHA15ec9398b55b4c6c06fd74e2baa220736bac1044d
SHA2560dd7c3f9f79a6d7d6bd062fca800f7269b20d8bc5939c27eec8224851d4ef2d8
SHA5128c58da7871c5da6bac600c3003a56998aa26f19f10b78c72896538adf053041bbc61e9030e004196134a18ed03309335134b1fce9b0a642e5674be3af8a85869
-
Filesize
136KB
MD5041093145048b9b158e306bc2946667b
SHA13c8439b6b98dc4c18e64209e5b8e46ac95116816
SHA256d6cec285814ecd9beb7a241bdff7cb1d4b378cc2fcb66548d73388f61bd53306
SHA512f54266ea1192cef480e45f5e1989f2a42024d861fc8bc826b009448abbe436dd94fdc4afa30a34593e220d87b3f13c0252ec2becf09c8e26ee8d8402fd602df1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd