Resubmissions
11-06-2024 05:56
240611-gm37fsxake 711-06-2024 05:52
240611-gkvsaswhpd 711-06-2024 05:50
240611-gj4c2swhme 111-06-2024 05:47
240611-ggypsaxcnm 7Analysis
-
max time kernel
51s -
max time network
52s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-06-2024 05:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://filebin.net/7i2wuqzbj1lfwdp1/Id_2024.rar
Resource
win11-20240508-en
General
-
Target
https://filebin.net/7i2wuqzbj1lfwdp1/Id_2024.rar
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133625586857409094" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4588 chrome.exe 4588 chrome.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 652 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe Token: SeShutdownPrivilege 4588 chrome.exe Token: SeCreatePagefilePrivilege 4588 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe 4588 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3296 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4588 wrote to memory of 5100 4588 chrome.exe 77 PID 4588 wrote to memory of 5100 4588 chrome.exe 77 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 3912 4588 chrome.exe 78 PID 4588 wrote to memory of 2380 4588 chrome.exe 79 PID 4588 wrote to memory of 2380 4588 chrome.exe 79 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80 PID 4588 wrote to memory of 2412 4588 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://filebin.net/7i2wuqzbj1lfwdp1/Id_2024.rar1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff848d2ab58,0x7ff848d2ab68,0x7ff848d2ab782⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 --field-trial-handle=1744,i,13004765965851156703,5448870696871923742,131072 /prefetch:22⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1744,i,13004765965851156703,5448870696871923742,131072 /prefetch:82⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2092 --field-trial-handle=1744,i,13004765965851156703,5448870696871923742,131072 /prefetch:82⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1744,i,13004765965851156703,5448870696871923742,131072 /prefetch:12⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2988 --field-trial-handle=1744,i,13004765965851156703,5448870696871923742,131072 /prefetch:12⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4236 --field-trial-handle=1744,i,13004765965851156703,5448870696871923742,131072 /prefetch:82⤵PID:740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4388 --field-trial-handle=1744,i,13004765965851156703,5448870696871923742,131072 /prefetch:82⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4620 --field-trial-handle=1744,i,13004765965851156703,5448870696871923742,131072 /prefetch:12⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4784 --field-trial-handle=1744,i,13004765965851156703,5448870696871923742,131072 /prefetch:12⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4780 --field-trial-handle=1744,i,13004765965851156703,5448870696871923742,131072 /prefetch:12⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4392 --field-trial-handle=1744,i,13004765965851156703,5448870696871923742,131072 /prefetch:12⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4744 --field-trial-handle=1744,i,13004765965851156703,5448870696871923742,131072 /prefetch:12⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4732 --field-trial-handle=1744,i,13004765965851156703,5448870696871923742,131072 /prefetch:12⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4904 --field-trial-handle=1744,i,13004765965851156703,5448870696871923742,131072 /prefetch:12⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1788
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:4768
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD545e489a3d0bfc21d81351f274ced6d7a
SHA1e2861769c35ba38d5d71c77b9d573316eb6cb59c
SHA256fb15b67ac9a5c69d853121750eb30e00f62a113924d17153ff1084930763611c
SHA51267a6eb04b1fc6cce9c752164afd995933588d819bafcbe42bdd069b22e253e773a61fde69ab21f803d2ea4d46e9679c5228d00aee7914af83e6af541acd62197
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5d2ecadaeaa33b2fe5d64522d8e5b37d3
SHA151292fd4a9172655daaefd731f162635547b29f7
SHA256902a2aea4ddf7bbcddb9ad47e6de2db5ad1142181f1736527163255946c37abe
SHA512b0d656077e3d7cc2e80774f6d839645418482ae08af7917adb530861e7c488b1d7b4ae7e1ccfb1943bc0ff19316b008de2c2a5c05e86fedfe49b8bc3c3545e76
-
Filesize
7KB
MD52d3b3635b50fff01cb6665bb6b2015e7
SHA115231084840735e14a1960d3f46334e6229fa325
SHA2560a86567ea912a513af2f302d4c6cdcb07c197ce8802c0f380b8c336080245e80
SHA5121625a95f21c7dc7320f340ab9cb02166d1c29265a4a92a26c2e4a3928b2dad5d4ce055c2329fecfcdf96337597ea9f712a69e53eed11e63a6d031d9bc76d34db
-
Filesize
129KB
MD598a7611761ebcfd8a75d0fc71c0f277f
SHA1e928ac8b12ee26af2374e6ba26b50336680cd67f
SHA256fda0884ea3ee74612f54637878372845078acbb92ebb05b68856fbe5e8dbfad7
SHA5122851e2270062e1d16ea8dd498ff48dc341de933a8b6cb582209ba9360239572ac0a826d0ee008c11101c7f223b951d65ee76cfee74b83a20a6c8720aba82af12
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5cf4d76f1a9247b679411a23597ab0736
SHA1ca7ea2bb3f8f7be7c59eb122cad5b045cf4e9c66
SHA256552fdfebf5efd5e7e3373b9030d26042a53a28197c2955a8dfa3eed3479c6bbe
SHA512a21e03a0fb43eb2f50e2ee98e9eee1ffcda02f5e418352d567904c4ff33ca536c938f0cc46aa258bc6df37d34f05799bfc8c7d99a34afba789a2286ec1c47a91
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD583704c7963de9f77ef9140f7c957c247
SHA17e084166afe58930cc1663a3db722b34754f9ecb
SHA2562f164fbe6bd7e11a243602c6cda5488794e237f57401071b701e2e82f9062ac9
SHA5121837f7d4e135c5a862d2875e9927085395a68e0cf16e3dd7cb556250ad9a478b22d2afb3050b0859f05a9aafd2c95e763d984d2f840dbfa343cc51598bd11019