Analysis
-
max time kernel
1199s -
max time network
1165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 16:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://sharevault.cloud/invite.php?id=Q5G5UR.tgz
Resource
win10v2004-20240508-en
General
-
Target
https://sharevault.cloud/invite.php?id=Q5G5UR.tgz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133613870649232968" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 692 chrome.exe 692 chrome.exe 2968 chrome.exe 2968 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe Token: SeShutdownPrivilege 692 chrome.exe Token: SeCreatePagefilePrivilege 692 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe 692 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 692 wrote to memory of 3644 692 chrome.exe 83 PID 692 wrote to memory of 3644 692 chrome.exe 83 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 628 692 chrome.exe 84 PID 692 wrote to memory of 2976 692 chrome.exe 85 PID 692 wrote to memory of 2976 692 chrome.exe 85 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86 PID 692 wrote to memory of 3728 692 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://sharevault.cloud/invite.php?id=Q5G5UR.tgz1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97d94ab58,0x7ff97d94ab68,0x7ff97d94ab782⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1904,i,11808492350502902940,15487444849142857421,131072 /prefetch:22⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1904,i,11808492350502902940,15487444849142857421,131072 /prefetch:82⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2188 --field-trial-handle=1904,i,11808492350502902940,15487444849142857421,131072 /prefetch:82⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1904,i,11808492350502902940,15487444849142857421,131072 /prefetch:12⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1904,i,11808492350502902940,15487444849142857421,131072 /prefetch:12⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4120 --field-trial-handle=1904,i,11808492350502902940,15487444849142857421,131072 /prefetch:12⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3272 --field-trial-handle=1904,i,11808492350502902940,15487444849142857421,131072 /prefetch:82⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4400 --field-trial-handle=1904,i,11808492350502902940,15487444849142857421,131072 /prefetch:12⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4588 --field-trial-handle=1904,i,11808492350502902940,15487444849142857421,131072 /prefetch:12⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4368 --field-trial-handle=1904,i,11808492350502902940,15487444849142857421,131072 /prefetch:12⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4612 --field-trial-handle=1904,i,11808492350502902940,15487444849142857421,131072 /prefetch:12⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4880 --field-trial-handle=1904,i,11808492350502902940,15487444849142857421,131072 /prefetch:12⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1904,i,11808492350502902940,15487444849142857421,131072 /prefetch:82⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4056 --field-trial-handle=1904,i,11808492350502902940,15487444849142857421,131072 /prefetch:82⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2292 --field-trial-handle=1904,i,11808492350502902940,15487444849142857421,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3100
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x478 0x4701⤵PID:4228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696B
MD585404c868f96d8369d973c57d41682b9
SHA1baf4f33760a3a15fc4df00d6c0f67137f8e0ee44
SHA256c9c50c1eaaef67c4cf7e664e19b65e6b836cc4def9e607cfbda7122f512bd1de
SHA512630d24f96709826634765645acb69f8946d659642087b0d6d9d9e2c6d0cf710557aa9a277feb270b345f64c0e62dfca34d800aa3934ec540597778836284f01a
-
Filesize
4KB
MD5563f13f4c7c633194bd970045c6a40fe
SHA1c69a661f8315bd262316b15b31339d404e4f5ad8
SHA25646dc1284ba8ab8694ff81734b41870a253405a73ecb2140faf632a5cd9c5124d
SHA5125730e16611f7a5c8d0047843b0369f8100c73f48c4c31e7be1c3c440798d31bba261ce8fc3ed6cb7fe244dcb324e3ec105cb79203a9e74b1ba4577f19d553e72
-
Filesize
4KB
MD59a0001ec7647b5fa67874ff93ef7061f
SHA11c906d7ce992b3fe131adb61677773bcc0faeec0
SHA256fd1a9bc72dcbfe087202ca79caee54b1b1e27d471b46840bca6fec319d5c8339
SHA512b0849d95d1e7527aa4b551b61e5cb76c294cfc267bc0890b7616cb3f39b373e65d2a5b7693dbe60467c5ea1ad5f4c0ad7a83be5aaf93844677cde3668dcea006
-
Filesize
3KB
MD5ec4622f3e06c4149ff91bdddef465932
SHA1b1c096e2c4414e8ebe9b911a57bc59eff9dce264
SHA2569c39f820f643880ab21a4484d38ea62b041e21d63e19193f28f40c697a37c779
SHA512f50d2bc1b7e63f2646bbb0f65a35eacca3bf397653ce99851d1bfbd8051c5c8cf460dde4ff7ca45298ae7529fa62b68d84fdc6fe72f83f2f8c80ae8cb9ffc361
-
Filesize
4KB
MD5e1157f6ed80c5a0852babac504f7d35f
SHA132e1ed7404fe382e6742af0803fc45360839f121
SHA256573f5911b63962dd25b8918128233644e1ab76487144c1336606b30a6c7c1ca6
SHA5120f2eabbd1e62baf93159b3c7baa389458aafdbfc9aa640a5d82d4f6da6b7087d34ac7a85783883f6e1b86e0de4baafeff6b1a24f57e388a8bdc91c848daaea8c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD5a0ad1994da45d635bbc907e5f68b1553
SHA1427f6b71279325b3c8d53c3f05937f4380313a90
SHA256db1d0bdc42669a7ef786f10c309762edb05a83c234bd4edc20ed7533462873b2
SHA512fe09bed15f15dde15fcd259738cd94ae3e6aa4695b934a0f4ec2dc44a3853b3669ed25739bda6471cb55ff6053c33ba58fc120870ead8fb2b42528088d11c3c0
-
Filesize
7KB
MD54a8a0da51da217ff6dc040b5c9f36eae
SHA1b17dc41bf8c5486febab3478942718d853940f38
SHA2563182b1ddbc69b29cb540b2db923cdae731f90ec498c62d80de195a8b74b78c62
SHA5129e4cef0100487a353578cb24b3e3dba27bb213e12c4003e06f9d8367516fbc8c6a70ecc6188782ae8864be86134a402354e98d90010467d6fbc4537e33268a8f
-
Filesize
255KB
MD5ee2a096af1408ea51147c690c83d48db
SHA1340fbad166b0f98f07af239fb3e19051c99f94e6
SHA256770029686741c03638e704aac577f5ba1e41e7584f2118c5f1608263fe99f2bd
SHA512b22762bb05ee2f57dc025d3233153429799a35218fec10aa6bf0782fb319e1cd0e89af49deae1532eafd49902f932d967bcd930083a6501af05ee40a762e7cf7