Analysis
-
max time kernel
44s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
08/06/2024, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
OIP.jpg
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
OIP.jpg
Resource
win10v2004-20240226-en
General
-
Target
OIP.jpg
-
Size
9KB
-
MD5
f3948c5b311d281a5fdad8412da5ba6a
-
SHA1
8fbd599292791a9fe94cab299c05345b6c42627c
-
SHA256
dcce493bf40316d8c5ddfe4992d5e8c4ae621e874d302cc1db122faf05211a5c
-
SHA512
923146ac0e4ae4ba95038ee56fccb2b93c6ee70f7b84de1bef9cefb74231f7e38a0fabc988bd2ae4939d0c0eba74e185ae8684bbc0c6042393e8486a17b0aa86
-
SSDEEP
192:YbJhswj9WYEnJfcgq7gAlu8eS2aOLuDkqZ2tVKwr:iJhhj4YEnJfrqRY8D2aO6DkqZGVKW
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2812 chrome.exe 2812 chrome.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeShutdownPrivilege 2812 chrome.exe Token: SeShutdownPrivilege 2812 chrome.exe Token: SeShutdownPrivilege 2812 chrome.exe Token: SeShutdownPrivilege 2812 chrome.exe Token: SeShutdownPrivilege 2812 chrome.exe Token: SeShutdownPrivilege 2812 chrome.exe Token: SeShutdownPrivilege 2812 chrome.exe Token: SeShutdownPrivilege 2812 chrome.exe Token: SeShutdownPrivilege 2812 chrome.exe Token: SeShutdownPrivilege 2812 chrome.exe Token: SeShutdownPrivilege 2812 chrome.exe Token: SeShutdownPrivilege 2812 chrome.exe Token: SeShutdownPrivilege 2812 chrome.exe Token: SeShutdownPrivilege 2812 chrome.exe Token: SeShutdownPrivilege 2812 chrome.exe Token: SeShutdownPrivilege 2812 chrome.exe Token: SeShutdownPrivilege 2812 chrome.exe Token: SeShutdownPrivilege 2812 chrome.exe Token: SeShutdownPrivilege 2812 chrome.exe Token: SeShutdownPrivilege 2812 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 1932 rundll32.exe 1932 rundll32.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe 2812 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2592 2812 chrome.exe 29 PID 2812 wrote to memory of 2592 2812 chrome.exe 29 PID 2812 wrote to memory of 2592 2812 chrome.exe 29 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2476 2812 chrome.exe 31 PID 2812 wrote to memory of 2252 2812 chrome.exe 32 PID 2812 wrote to memory of 2252 2812 chrome.exe 32 PID 2812 wrote to memory of 2252 2812 chrome.exe 32 PID 2812 wrote to memory of 2480 2812 chrome.exe 33 PID 2812 wrote to memory of 2480 2812 chrome.exe 33 PID 2812 wrote to memory of 2480 2812 chrome.exe 33 PID 2812 wrote to memory of 2480 2812 chrome.exe 33 PID 2812 wrote to memory of 2480 2812 chrome.exe 33 PID 2812 wrote to memory of 2480 2812 chrome.exe 33 PID 2812 wrote to memory of 2480 2812 chrome.exe 33 PID 2812 wrote to memory of 2480 2812 chrome.exe 33 PID 2812 wrote to memory of 2480 2812 chrome.exe 33 PID 2812 wrote to memory of 2480 2812 chrome.exe 33 PID 2812 wrote to memory of 2480 2812 chrome.exe 33 PID 2812 wrote to memory of 2480 2812 chrome.exe 33 PID 2812 wrote to memory of 2480 2812 chrome.exe 33 PID 2812 wrote to memory of 2480 2812 chrome.exe 33 PID 2812 wrote to memory of 2480 2812 chrome.exe 33 PID 2812 wrote to memory of 2480 2812 chrome.exe 33 PID 2812 wrote to memory of 2480 2812 chrome.exe 33 PID 2812 wrote to memory of 2480 2812 chrome.exe 33 PID 2812 wrote to memory of 2480 2812 chrome.exe 33
Processes
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\OIP.jpg1⤵
- Suspicious use of FindShellTrayWindow
PID:1932
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7aa9758,0x7fef7aa9768,0x7fef7aa97782⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1104 --field-trial-handle=1368,i,6996839639833789289,14480478018791962471,131072 /prefetch:22⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1368,i,6996839639833789289,14480478018791962471,131072 /prefetch:82⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1588 --field-trial-handle=1368,i,6996839639833789289,14480478018791962471,131072 /prefetch:82⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2308 --field-trial-handle=1368,i,6996839639833789289,14480478018791962471,131072 /prefetch:12⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2316 --field-trial-handle=1368,i,6996839639833789289,14480478018791962471,131072 /prefetch:12⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1408 --field-trial-handle=1368,i,6996839639833789289,14480478018791962471,131072 /prefetch:22⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3184 --field-trial-handle=1368,i,6996839639833789289,14480478018791962471,131072 /prefetch:12⤵PID:580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3400 --field-trial-handle=1368,i,6996839639833789289,14480478018791962471,131072 /prefetch:82⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3532 --field-trial-handle=1368,i,6996839639833789289,14480478018791962471,131072 /prefetch:82⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3664 --field-trial-handle=1368,i,6996839639833789289,14480478018791962471,131072 /prefetch:82⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3744 --field-trial-handle=1368,i,6996839639833789289,14480478018791962471,131072 /prefetch:12⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3728 --field-trial-handle=1368,i,6996839639833789289,14480478018791962471,131072 /prefetch:12⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3164 --field-trial-handle=1368,i,6996839639833789289,14480478018791962471,131072 /prefetch:12⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2656 --field-trial-handle=1368,i,6996839639833789289,14480478018791962471,131072 /prefetch:12⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3204 --field-trial-handle=1368,i,6996839639833789289,14480478018791962471,131072 /prefetch:82⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD57f23d535acf41edd1f178efb507b52fc
SHA1bafa8c1158592d660b4e5c55af6d3fac2c190ac4
SHA256306b4c2895629617525ef6e236a7450db2ba2de671de983804c51fd6bcfb493c
SHA512b47ce01b9a73eacdad4b818c1a3f6d8ab6e103fb7f589251262e719408c76dd984489353db53b4b1da1ae556df4ab74a9c34ab71b8562e40a1c965039a6e7614
-
Filesize
202KB
MD59901c48297a339c554e405b4fefe7407
SHA15182e80bd6d4bb6bb1b7f0752849fe09e4aa330e
SHA2569a5974509d9692162d491cf45136f072c54ddc650b201336818c76a9f257d4d2
SHA512b68ef68c4dcc31716ce25d486617f6ef929ddbb8f7030dd4838320e2803dd6dd1c83966b3484d2986b19f3bd866484c5a432f4f6533bb3e72f5c7457a9bb9742
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT~RFf770bf2.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
527B
MD503203e67cc54834cd1da995e18c2c3a3
SHA16d31085f67a2e998f4bd2bf20aa6a9959a958d47
SHA25663d5e5e2fbb752572735271c8eb07abb47bf3d99bbe26db49bd39fdd6a37826c
SHA512cd5609a927c634be784859f00316aab6065f9f01909c9f4d9ba84e4e2ce405feca783e716e761f368942c238b1859f519b32dac6d2473bc29000da38db11dc5c
-
Filesize
5KB
MD597ecacb648ffbd2140cee8e712851c69
SHA1c989ce5bf49fcd2a55e01a124ecb0b7af7b6ab76
SHA256f627db4ecff305b879432cdd12e3db72c74e9c53818f54b788bc3ee8a231befa
SHA5121b878ae8aeceb4fa9713ec2b4b924ad40fc1b159d556fe1e6fdc9cdf010bd84794e048d939f49ebef242734940f239cdda72f359567cb82528b6aaa66685e04b
-
Filesize
6KB
MD56a624a8646e816e04f367312d3987fc5
SHA15a083b77bb10d375dfc573c960e174dba95d946e
SHA256aec770af4cce8d0467679bff2388ab138beda8255f2af21c508de9c6ec110e96
SHA51263d267ce74cc9a46b89be8c107b5088b8e01fff1d3f877467f4af3873318c07e00b755751f806c6c485bee35a8a2cf14900e7923e0369505c23b079f4e20f9d9
-
Filesize
6KB
MD5ba438bff8533d725b99d5e0268a806e1
SHA160453c803cd5b95d16c787220742795a40648535
SHA2568e85c61efabfb1cc92dc5ecc23a4145bbb791869e5e1f4529b71aed2a60ab473
SHA5125c993dc5fb9a3c9f2349047d535981e1a0b0823bbfb6b57c8f31cdbe61c40167009df56756a90373d55afb6d6cb00aad0c03161314efd3ac03273c3227b6d82e
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
285KB
MD5555014a9691de4fc29b6071cad51064a
SHA13701a2f120dfbca7d61b90e4c319491fae27d751
SHA25606cf94dc048404c428b3e2328c98a46b9ed35697fb6995332b8f6d338c3cf228
SHA512023509c7692950d5e173b1e6768756542791f7a0b4f417eabb7b497fc86d4acef24ca808a6eab395976f6dd35647dd0a1d19ce06622a0263e9bb1531cf668998
-
Filesize
285KB
MD561008e4b75f7d3bfb5821cf0a13ed771
SHA1235f7c227da12a14cee688e60ae1d573fb1beade
SHA256d51841f4b7fe638d30cb1a78d0843b25e8e590aa67a4d737ad8ee953cf01a1d6
SHA512b9121bc5d4a77aa0ecf1024015816810e2435ff2258adce9bea1ad328225b438829629cf882a732d9e0dde37d06e22947166f0821d4eb0e5c33c6829cda4e6d2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58