Analysis
-
max time kernel
299s -
max time network
297s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 16:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.facebook.com/people/Promos-Brou/61560421768620/
Resource
win10v2004-20240508-en
General
-
Target
https://www.facebook.com/people/Promos-Brou/61560421768620/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133637186958448146" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 2524 chrome.exe 2524 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe Token: SeShutdownPrivilege 1548 chrome.exe Token: SeCreatePagefilePrivilege 1548 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe 1548 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1548 wrote to memory of 1848 1548 chrome.exe 80 PID 1548 wrote to memory of 1848 1548 chrome.exe 80 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 4640 1548 chrome.exe 81 PID 1548 wrote to memory of 2188 1548 chrome.exe 82 PID 1548 wrote to memory of 2188 1548 chrome.exe 82 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83 PID 1548 wrote to memory of 1316 1548 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.facebook.com/people/Promos-Brou/61560421768620/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedb2cab58,0x7ffedb2cab68,0x7ffedb2cab782⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1656,i,4075164756217237054,12149676445466004588,131072 /prefetch:22⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1656,i,4075164756217237054,12149676445466004588,131072 /prefetch:82⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2216 --field-trial-handle=1656,i,4075164756217237054,12149676445466004588,131072 /prefetch:82⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2908 --field-trial-handle=1656,i,4075164756217237054,12149676445466004588,131072 /prefetch:12⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1656,i,4075164756217237054,12149676445466004588,131072 /prefetch:12⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4352 --field-trial-handle=1656,i,4075164756217237054,12149676445466004588,131072 /prefetch:82⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4512 --field-trial-handle=1656,i,4075164756217237054,12149676445466004588,131072 /prefetch:82⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4500 --field-trial-handle=1656,i,4075164756217237054,12149676445466004588,131072 /prefetch:12⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3256 --field-trial-handle=1656,i,4075164756217237054,12149676445466004588,131072 /prefetch:12⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 --field-trial-handle=1656,i,4075164756217237054,12149676445466004588,131072 /prefetch:82⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1656,i,4075164756217237054,12149676445466004588,131072 /prefetch:82⤵PID:3420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 --field-trial-handle=1656,i,4075164756217237054,12149676445466004588,131072 /prefetch:82⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4552 --field-trial-handle=1656,i,4075164756217237054,12149676445466004588,131072 /prefetch:12⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1548 --field-trial-handle=1656,i,4075164756217237054,12149676445466004588,131072 /prefetch:12⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4492 --field-trial-handle=1656,i,4075164756217237054,12149676445466004588,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4656 --field-trial-handle=1656,i,4075164756217237054,12149676445466004588,131072 /prefetch:12⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3180 --field-trial-handle=1656,i,4075164756217237054,12149676445466004588,131072 /prefetch:12⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5e29f7cec7d37f715f82b0fea94293f6b
SHA15dd7956e29d885934e7458e2929e006af040e3da
SHA2565de14627b31a1164a68f46e229bd3d7c9f75cceaf150b7983839133c058eab7e
SHA512e73ae6e1cec5b4baf59e4b8e926c2cacd4cb0322caf2ffc8b9a7abebf0d53d76e805c428080522b8d4f0d51519ac60d13f7089409a5d131bfd3c0640a16b5aff
-
Filesize
257KB
MD54f9b419d14afb8b7a6db9bb1bf8da203
SHA1033847956a81c7db15ae23c8d5cd67eb0ebfa535
SHA256cf354a5eec28af27e11848bcaa26d3f05965b72ee6d4e11437ccd56a8bcaed7c
SHA51274342343c8e9ef59d350ba493eec075816064783cdba24b1c07adcb020f407298852e35b1ecc4eac42f81b22cff261a8c8ce609bce1eae40bad342029baeb044
-
Filesize
257KB
MD549d4e30eaaef169b52a8f93ca01aa3d1
SHA1e7c38219a3a0367adc13a8db9d9b71967966e2bc
SHA256e4b9a6cc741a05467ac54cf44b348fcbda5af32fbc763630210bfce610383dd4
SHA512bea265d45f6d8c323a340f879c7aa4a7df1cda542f7651fa881b0181c06c6aebdfc0a90950d1c5f8f70138a4f2b52efe4cf3386e1366739cd6b52bb41ffe3c8d
-
Filesize
91KB
MD588f33330685906042f41408456733d98
SHA1f2ab45a28a34bf41055e8a9731381f45c44b6fea
SHA256570d0e9b828b8d6169ea1c02df2ae048bac3b6093c2fc757db79aee8d7d29e1a
SHA5126ee7a27926716fe186c4e6bae8d04deeadd7c6ff5cf40edd6513c7b90a38872b3786cb06f3331457ea906177e4e485f3685066bf1a9057d73ffb786e33f91117
-
Filesize
88KB
MD5e98c211f85b4724f5f6e39d656021d4c
SHA1c0ed2df4ae11fe74394f914138dc449d2baf7ad4
SHA256389960da58342c06db1266021756628929525e2b6dc055a5e40661e2d42facbf
SHA512915edeb454f2bce9916d9d922433a161ff07c3b0262c70709201dc0b1e5cc192defa4420627fd0708c9ceee7fdb317ac5541253939c8f510f46014914dddba92