Analysis
-
max time kernel
44s -
max time network
264s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 11:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://williams-bar.com/#menu
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://williams-bar.com/#menu
Resource
win10v2004-20231215-en
General
-
Target
https://williams-bar.com/#menu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3032 chrome.exe 3032 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3032 wrote to memory of 3044 3032 chrome.exe 28 PID 3032 wrote to memory of 3044 3032 chrome.exe 28 PID 3032 wrote to memory of 3044 3032 chrome.exe 28 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2376 3032 chrome.exe 31 PID 3032 wrote to memory of 2732 3032 chrome.exe 30 PID 3032 wrote to memory of 2732 3032 chrome.exe 30 PID 3032 wrote to memory of 2732 3032 chrome.exe 30 PID 3032 wrote to memory of 2608 3032 chrome.exe 32 PID 3032 wrote to memory of 2608 3032 chrome.exe 32 PID 3032 wrote to memory of 2608 3032 chrome.exe 32 PID 3032 wrote to memory of 2608 3032 chrome.exe 32 PID 3032 wrote to memory of 2608 3032 chrome.exe 32 PID 3032 wrote to memory of 2608 3032 chrome.exe 32 PID 3032 wrote to memory of 2608 3032 chrome.exe 32 PID 3032 wrote to memory of 2608 3032 chrome.exe 32 PID 3032 wrote to memory of 2608 3032 chrome.exe 32 PID 3032 wrote to memory of 2608 3032 chrome.exe 32 PID 3032 wrote to memory of 2608 3032 chrome.exe 32 PID 3032 wrote to memory of 2608 3032 chrome.exe 32 PID 3032 wrote to memory of 2608 3032 chrome.exe 32 PID 3032 wrote to memory of 2608 3032 chrome.exe 32 PID 3032 wrote to memory of 2608 3032 chrome.exe 32 PID 3032 wrote to memory of 2608 3032 chrome.exe 32 PID 3032 wrote to memory of 2608 3032 chrome.exe 32 PID 3032 wrote to memory of 2608 3032 chrome.exe 32 PID 3032 wrote to memory of 2608 3032 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://williams-bar.com/#menu1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7159758,0x7fef7159768,0x7fef71597782⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1476 --field-trial-handle=1260,i,13891417385195222222,5475911976298518450,131072 /prefetch:82⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1104 --field-trial-handle=1260,i,13891417385195222222,5475911976298518450,131072 /prefetch:22⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1560 --field-trial-handle=1260,i,13891417385195222222,5475911976298518450,131072 /prefetch:82⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2304 --field-trial-handle=1260,i,13891417385195222222,5475911976298518450,131072 /prefetch:12⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2312 --field-trial-handle=1260,i,13891417385195222222,5475911976298518450,131072 /prefetch:12⤵PID:112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2648 --field-trial-handle=1260,i,13891417385195222222,5475911976298518450,131072 /prefetch:22⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3248 --field-trial-handle=1260,i,13891417385195222222,5475911976298518450,131072 /prefetch:12⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3556 --field-trial-handle=1260,i,13891417385195222222,5475911976298518450,131072 /prefetch:82⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2128 --field-trial-handle=1260,i,13891417385195222222,5475911976298518450,131072 /prefetch:12⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=1704 --field-trial-handle=1260,i,13891417385195222222,5475911976298518450,131072 /prefetch:12⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2300 --field-trial-handle=1260,i,13891417385195222222,5475911976298518450,131072 /prefetch:12⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
3KB
MD56bc929110bceafcc25ada410c6cebe4a
SHA1c9a3a4fba93ffe5b4eb00c44ed1d611a7c5f9b55
SHA256d1cea8eeef979763dee5b0c293bb0fc2e1666edd782240262d49410e401ae5ff
SHA512cde2e1133a2b2c0e79e39bebf0544b2edb021ffc70b90f3d676c5d5c4f7129a7b4bee1e1996f81472daf2f03d422239b13f5b029766b015b6b83b5ecf2126e6e
-
Filesize
1KB
MD5bac960e06328365bf9f5693955b19346
SHA1988e5154159e5ed8ab78487c66a31732e2d8e7c3
SHA256446dd0388d6b3d24331adf2a1b2770d7e4a291d1f5a87a4d99cef3a1d72aac06
SHA512a8ef82e81282a38915e07f3016313f8fcfa66b597c6ed661c71c359ecc76793d51ff7c4f8817bddab834ee48991edd65298ad34090ff5f54f6c59d4247a631ff
-
Filesize
1KB
MD5f57651ff0f6811dba5525d4f04ae3801
SHA1092bbff7dd0dda16319e2da5548a2d6698a35de6
SHA2564e3b623bba2cc60306501dd84e0d22a07de1c25642c0b2cfd30fcefc71dc2509
SHA5123e04d062d1e6c2648a08beb4c2b0db567646f14611e6b54a622a7736a1ec16352ae7c0787a7ed9713a944dd688da030546d11b0208af46c31781a64a036d8946
-
Filesize
4KB
MD58bf40ce8e80b3d52ac5b90a412b9d39f
SHA1ccaaa2ddecb07170472a31cb04f75bdc3d7c44d7
SHA256ae91b56f3c9c4c0603151d79535d561dfdda45b995a4c98e590a26262260816f
SHA5124c427e6de9bb9beadea1319480a771ee672fbf0ee842113b81fb03dac6c3d6d3070fd57a7b9d0f46b446b5f09da98f3840e88d151a182b2407b3e3c59dd74035
-
Filesize
4KB
MD5515b67d8d60ef7290cab7921f824ceaf
SHA13dbcdc5ddc15bd26c93a4247c5c5e93431f83d4b
SHA256802a0bbeb2c2e784a4062fb76565b7a0746f07e04f85ad99b261161cca145794
SHA512dc057b175c00d86fa8db5eac588e2a35a31ef28f3a4f1cfa601325d539844dd81c84362ca7fdc098132706280eb384729e12b7965fd2f8ddcd2e4c8719ce40d0
-
Filesize
4KB
MD57ae788354c708ad86ecfe956306fd128
SHA1a520ad5035e496cd09cf3649c64ea694872e77e7
SHA2566dc0f369d3dc094025394cf69d371a7f3ff089e18b347e506c19a9116a02c120
SHA512124afb2bb0be880e78d9278bf3c26f57639fc532deca75bc0e8784c4b2b849de4398ab8b87139d3ce4f4a9dac8b8c68ff53a3015f7e3a5be7ab4ac9febd52c38
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\f2bbf83d-40bc-4790-8ec3-dcd388b76c44.tmp
Filesize5KB
MD5b25fe904d74502bca69f52e02c52625a
SHA1bea52d2999a27d03dc4d8c2c7b0a79494a80cb1f
SHA256e93fe6a0d02d71d23fd06d690d69da1f130f4dd09199b3d5298050aff5f7754f
SHA5129476c851db1d502918e49dda3735656d7ad1d9499a78ffd442052d546dca30807927f059786f76361e29b0b5a40f4320eb35e9c4cfb1624d19e62469b9135d26
-
Filesize
114KB
MD51ebea2467509cf0baddc8dbe2fbebe9f
SHA1f2355db83d885f9f8b31496ee4fdbb265ccfb5b3
SHA25649d4b66c19692585ba8de7150cd0525b9abe2a873dd8201951e9b6f8acf1bafd
SHA512ae56af420f54f87b9ae06296a935f8844ac5e16af9a3acd12359a06fe97018db4d7f7efd2b0bcd49864725029731c5fa37ed4275c88d1b115b2be1a5d949b164
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06