Analysis
-
max time kernel
109s -
max time network
102s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
31-08-2023 02:50
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
kutaki
http://treysbeatend.com/laptop/squared.php
http://terebinnahicc.club/sec/kool.txt
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qtkaaufk.exe NEFT_Copy.bat File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qtkaaufk.exe NEFT_Copy.bat -
Executes dropped EXE 1 IoCs
pid Process 2688 qtkaaufk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133379238751852927" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3116 chrome.exe 3116 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe Token: SeShutdownPrivilege 3116 chrome.exe Token: SeCreatePagefilePrivilege 3116 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe 3116 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1304 NEFT_Copy.bat 1304 NEFT_Copy.bat 1304 NEFT_Copy.bat 2688 qtkaaufk.exe 2688 qtkaaufk.exe 2688 qtkaaufk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3116 wrote to memory of 1656 3116 chrome.exe 70 PID 3116 wrote to memory of 1656 3116 chrome.exe 70 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 1516 3116 chrome.exe 73 PID 3116 wrote to memory of 2272 3116 chrome.exe 72 PID 3116 wrote to memory of 2272 3116 chrome.exe 72 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74 PID 3116 wrote to memory of 2080 3116 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://raagamayuribuilders.in/jastef1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb53959758,0x7ffb53959768,0x7ffb539597782⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1728 --field-trial-handle=1872,i,17334230728286891663,5183844513312268031,131072 /prefetch:82⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1872,i,17334230728286891663,5183844513312268031,131072 /prefetch:22⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1872,i,17334230728286891663,5183844513312268031,131072 /prefetch:82⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2748 --field-trial-handle=1872,i,17334230728286891663,5183844513312268031,131072 /prefetch:12⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2624 --field-trial-handle=1872,i,17334230728286891663,5183844513312268031,131072 /prefetch:12⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3852 --field-trial-handle=1872,i,17334230728286891663,5183844513312268031,131072 /prefetch:12⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=1872,i,17334230728286891663,5183844513312268031,131072 /prefetch:82⤵PID:32
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2736 --field-trial-handle=1872,i,17334230728286891663,5183844513312268031,131072 /prefetch:82⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 --field-trial-handle=1872,i,17334230728286891663,5183844513312268031,131072 /prefetch:82⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2184
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\Temp1_NEFT_Copy.zip\NEFT_Copy.bat"C:\Users\Admin\AppData\Local\Temp\Temp1_NEFT_Copy.zip\NEFT_Copy.bat"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
PID:1304 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:2800
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qtkaaufk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qtkaaufk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5fed373008451012bf9d81792a5ae80e4
SHA1ca276067581806ef85aa1ba47174014264dbd3be
SHA256e30bf0537b396c78969ccef008fb50f596568d84b4c96126c95970a53adf02fa
SHA5122c54039f9ecc9780118928e0c2406363bc266669de53f7481e2e0b0e8104f007865585e1901ceac5ee6155eeeb3fab2ac2729b20757751f8c463402ce03d6fdd
-
Filesize
815B
MD58366fcabbab0d35068c6319206305a2a
SHA16f6365f46f7015aa81f761ba4ead6e31ca743910
SHA2560a3b318ecf6f7957e0c00e5ffb5663f09fea4ad885b92bdc594bfe601a4bc815
SHA512f4b980c6fda94b52c08145290c0b0503f0a9c645bc79d67c6e4adc3a6b75798813396fc97b4c3bf258dde064ea303a0d7aecbc1befb9a339ad0d296546cfb82b
-
Filesize
703B
MD577d793d2c93f35caba31a7326e9bd149
SHA18e6c658026f70168c4f569209b8df41629644983
SHA2566204f7332ea3fff1da0954c0064210d7c6f97f8334711dc3199adbff0a7435f8
SHA51221a516a2b7e473cf0d690178bfb9875f4e9d7d0ef978762a1851262f75c04373468eea324bf65e5b1aabaa89ae18314a9a0d9a3ba0bcce09921236fa4143e0c5
-
Filesize
6KB
MD57fc4e38ff62d16234d33ed0e952af4df
SHA16b654536f2e8734b1d9d4898e08d4cf777835529
SHA2564dbac39e756c1b509d78653ed6dd1405f6525d8ea4fc52a0d0ff8101340c4270
SHA5120edc532872f2bd283a32db2de88438941fb49e6411fe6e7080af011d53e868d23762c837c6c0390cf3a60c1586e5e29416ac689f857091051e613797d2c50369
-
Filesize
6KB
MD58fb90836699b5299c504886be3e59c30
SHA11b1462f14ef39fc4256a0f8b7c0a54ea58a28ce6
SHA2564a7c65a9aafc9b3d38620ddbd514ff25d66f2166460d8217012394b975525640
SHA512189b014e6ad9f042a00117ec6cca31d8a5c2875a879e9b57899433c60b1f38b07c895e56b53290b431e7326c36ad7082e88774de85240422dc0ceb2dcdb7170b
-
Filesize
6KB
MD5569116c896915225a8bd05e88040fbb7
SHA12d733d36e48ecf4f5dbafff1468468e98e22f9c4
SHA2560520507fed2a3028688c3b3f35c853624fc30b1873a2053eef26f3b07649c738
SHA5129bd0d1f64cdbb498d88d1146bd4d30526bc33310892bb02d3769f7c23aedb07797e344b7b74becc1895ee4506a1dc1038447a9c78789714067f9d8c9692b9031
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2.3MB
MD59c153ac25f02739019b04b0a8ce82c4b
SHA164136c4238d140a6fb1ec542744ff90aba5bac09
SHA25683269040e4f510f11a327807b23dda45d98386676fc309e27b3eebd9cefa8416
SHA512a7a9bb1eee5470bb4939d61df33c3840fe69e8503e792d474d7fa273f4c77dd42c84a8e6bdd78b3b157b7aadada401c903e46d3237fa5fcfa6f7b27c477bb4de
-
Filesize
2.3MB
MD59c153ac25f02739019b04b0a8ce82c4b
SHA164136c4238d140a6fb1ec542744ff90aba5bac09
SHA25683269040e4f510f11a327807b23dda45d98386676fc309e27b3eebd9cefa8416
SHA512a7a9bb1eee5470bb4939d61df33c3840fe69e8503e792d474d7fa273f4c77dd42c84a8e6bdd78b3b157b7aadada401c903e46d3237fa5fcfa6f7b27c477bb4de
-
Filesize
2.1MB
MD5d0f2c2de0407cefe7a24c8eb22237a61
SHA1a46ba89e46a3d04fd9c919837441625ddaa4febe
SHA25623d3f3b9c74b6707db237bdfa797d7425f18938614051ddb633712a42e7f3c96
SHA512c59e010a958a1f714bd064592d6b0f26619b2efc879a1b8496d6132a598aa5edddec2e6537c34b1944893926f7664a989bf8df752f8bfffeabae4d3f7fbfb3e3