Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
600s -
max time network
529s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2024, 00:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1YHAKGdRCDez54siVSP12WryeQPEwItA0?usp=sharing
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/drive/folders/1YHAKGdRCDez54siVSP12WryeQPEwItA0?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 drive.google.com 5 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1948 msedge.exe 1948 msedge.exe 592 msedge.exe 592 msedge.exe 2880 identity_helper.exe 2880 identity_helper.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe 592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 592 wrote to memory of 3144 592 msedge.exe 83 PID 592 wrote to memory of 3144 592 msedge.exe 83 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 4136 592 msedge.exe 84 PID 592 wrote to memory of 1948 592 msedge.exe 85 PID 592 wrote to memory of 1948 592 msedge.exe 85 PID 592 wrote to memory of 4512 592 msedge.exe 86 PID 592 wrote to memory of 4512 592 msedge.exe 86 PID 592 wrote to memory of 4512 592 msedge.exe 86 PID 592 wrote to memory of 4512 592 msedge.exe 86 PID 592 wrote to memory of 4512 592 msedge.exe 86 PID 592 wrote to memory of 4512 592 msedge.exe 86 PID 592 wrote to memory of 4512 592 msedge.exe 86 PID 592 wrote to memory of 4512 592 msedge.exe 86 PID 592 wrote to memory of 4512 592 msedge.exe 86 PID 592 wrote to memory of 4512 592 msedge.exe 86 PID 592 wrote to memory of 4512 592 msedge.exe 86 PID 592 wrote to memory of 4512 592 msedge.exe 86 PID 592 wrote to memory of 4512 592 msedge.exe 86 PID 592 wrote to memory of 4512 592 msedge.exe 86 PID 592 wrote to memory of 4512 592 msedge.exe 86 PID 592 wrote to memory of 4512 592 msedge.exe 86 PID 592 wrote to memory of 4512 592 msedge.exe 86 PID 592 wrote to memory of 4512 592 msedge.exe 86 PID 592 wrote to memory of 4512 592 msedge.exe 86 PID 592 wrote to memory of 4512 592 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/drive/folders/1YHAKGdRCDez54siVSP12WryeQPEwItA0?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa97c046f8,0x7ffa97c04708,0x7ffa97c047182⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,8110541746428318962,13538763970204567230,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,8110541746428318962,13538763970204567230,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,8110541746428318962,13538763970204567230,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8110541746428318962,13538763970204567230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8110541746428318962,13538763970204567230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8110541746428318962,13538763970204567230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,8110541746428318962,13538763970204567230,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,8110541746428318962,13538763970204567230,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8110541746428318962,13538763970204567230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8110541746428318962,13538763970204567230,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8110541746428318962,13538763970204567230,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8110541746428318962,13538763970204567230,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,8110541746428318962,13538763970204567230,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5488 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5fe8ff5b24a50810ef8b5c9606c7d5877
SHA11f608202c9c6e150e03c8f933869f22cf11bd385
SHA2562cf778df1a0fca227e0de4b97752af8669cefa5589bd479b7b53dc2a820adbd6
SHA51200e1dbccb177b60efcb05113f1dcf7ec286fda60b317908b968304158be16056bf66e65f7f0850c95f84bcb9559878df161f78ce971ea96d54586eba010d7eff
-
Filesize
3KB
MD50cab6fa8832690b01217e7ae796ed133
SHA100af1fad1a9c2c641d068297384c9cec0ff6ae63
SHA2565bb3ea3cc0cfff66cc13e2aef0d1ebd3b52a6446df6266442975b5b8808d90c0
SHA512d6e295573c432786c784897bfc5d5752eeea9e2e24a5518ffd4e37d6b932c72d05180dd2e124dedf54e799d1b55f3cd9487338c7b7454b0501c41288e96cec6e
-
Filesize
3KB
MD5216c7c7147422e3bdd6f6ea7aa12c80c
SHA194c2db5d6347a31fdbf79e4f53ebce7b6ec5d58a
SHA25666b176ae2f566af3deb3a87aae9de0925dee108d96975718715b51bd13ab52e2
SHA512f078ec8e0775d3e09f8c99daa9e53311e3194cba1f2bfa0653e035d7db906581890a4c6b6b6f4799218f674f78d08336b985a3cdf9c1d8b9f6d51effcf2e4e6c
-
Filesize
3KB
MD5a3cb7fb5c413407b3e1c208ae4432943
SHA128844988e4394f8ee99acf2b97e7747b637b3fc5
SHA256fd58ac985fcb28cec04a8482ad207aad540843f6874864bc00a2744c84c2be9d
SHA512f3feb9343e7b05956586799a35eea40e0ba38571807e2b4994f7bbe8401b47a32f501f4371b427af82864c7fc7fbcd284d90277b1b6fcbb1983d2b97f122ab68
-
Filesize
3KB
MD590cb46f5f61a8ba23b6d1576090fb7d6
SHA14d692d92ddd5e344b1e5249e5a137edabbd9d9bd
SHA2566061a0616dbb93081e2d58a376e6eb31c790d63e299003b3c2ef5ddef1a19158
SHA512d2906dd1b60c4906e59e14c2816eb0dcd07b1432be20279312f45cd443d26109ae0d2e8afcff9c378d9341ec3d2773f4c77ee1d6c7615d1cece1d145a7cdfd3b
-
Filesize
3KB
MD5ed943f53600c903193978f6c662f23ea
SHA1458fdd654dde1e8577301a85fb9d4c42ef19aa5e
SHA256b98ed9fabbffcdc474962e874c4416a865be1d7bb7e472e67df912a211bb4cec
SHA512388c7e33ed132afe0c8f74acb1ac9264adbe8139dfbe283a61353423ffb03b1e23211c4bf503d2d52ae41ee965335dc10d4c0317ee447f663c6d2c8dd95faea4
-
Filesize
3KB
MD531af5bf24e7cf6dc05228829c823bdce
SHA1a099744767f29de586094d96815bd96f82e1ed70
SHA256af86334c765ebbe50582685aeec855750eb7036ba7603ff6fa1557196e719b57
SHA512cab49f23f64a7f7f40d34056697993f3973a7d5960fbfb9e79819bd5b7c28682024423f855776f92e5e76a82c33ef42606dd0e7298449d88759ecae54d936275
-
Filesize
5KB
MD570b4d1237f5e03bf0b38e6e260b566fa
SHA1c38916b43bdb88a2112720b29e1ca7e42a9a3634
SHA256aafc5fcd5bc96c69e5b3cc290ecaeec74be9de3fd701ea4f380b071f2cd15d49
SHA512f846959e1f58555b1317a0f033a4358e5b5b688f280b4ffdddb9c4fd1b75f56383499d87f6f8fb81265484a70aa066d6e987b4b050d6adadbb3d8836ae1a80ca
-
Filesize
6KB
MD585e8e3d8ed18fdeea06c419f2ce95eaf
SHA160db02af21562e45c8730ddd166098890c2b98af
SHA25674fef69e5d1f29156c1e16092f236b28bdcfc1cbb6d1b378227ef2aefc993222
SHA512043482978f5d87c2836e1efdd71119a4214bc777c4f22cc00309646005f37c05d180ef792bf347dc4286dd7dda9dff41667c1644394f87cce5adade522597d12
-
Filesize
1KB
MD5aad2cc55c66d55b0cb1f3cf33409d9c4
SHA1ef26b9f11647cab6b5bda0c59839769f06791135
SHA25602412038539f8f8984fb6ec922e20a3911ee385a1d8c72a2a0ca47768f3d522c
SHA512638bfb9692c5287983b188e2c511893ad20475e6bd9e2aa24c754dfe3ccfec1c4a443688f1887ca5e305954bcd4b32aef3e157d9c4bb8eb3a5c9a5a8664f3764
-
Filesize
1KB
MD5bfe678892e870ec17f71c4de0fd78139
SHA1b777c4a53b0d5bc2d6d99a6bd0fcad9c275371d4
SHA256ac3611f892011fa15af94725f78a1553e5bb97f45cc8b0c38a200d6bdaec9590
SHA512c5cbb95f2a2a949fa43365946db38bfbf95c3ba1cb4a739e6d742be9ef7b42c1457187310890d12dc29c063c8b1e66757842d9b5a6e1389f6bf86b84be152e3d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a9cb09b1ca3f59d009e65ae1e51721e7
SHA19b1448db981014ed4be459976d15d588267c1fdd
SHA256549c6d835c3ea15d1d5e29bee9385cfda93c3c500e46bb3e869daafca77d5bea
SHA51202229e97cbb3b45949fa6103822ebf60222e01327911d527925488358e29fb585029e78ae8489127b7a21fed718acb2b6a9a3fd203c8066a85955d4f6b7f4975