Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
18-07-2024 04:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1dScClrO3At8rN9KNbFUENPH0U4pmruqn/view?usp=sharing_eil_m&ts=66989cf0
Resource
win10v2004-20240704-en
General
-
Target
https://drive.google.com/file/d/1dScClrO3At8rN9KNbFUENPH0U4pmruqn/view?usp=sharing_eil_m&ts=66989cf0
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 drive.google.com 11 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133657521145924434" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 404 chrome.exe 404 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: 33 1860 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1860 AUDIODG.EXE Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2012 wrote to memory of 5076 2012 chrome.exe 83 PID 2012 wrote to memory of 5076 2012 chrome.exe 83 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 1036 2012 chrome.exe 85 PID 2012 wrote to memory of 3512 2012 chrome.exe 86 PID 2012 wrote to memory of 3512 2012 chrome.exe 86 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87 PID 2012 wrote to memory of 864 2012 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1dScClrO3At8rN9KNbFUENPH0U4pmruqn/view?usp=sharing_eil_m&ts=66989cf01⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb51b4ab58,0x7ffb51b4ab68,0x7ffb51b4ab782⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1940,i,9189578685930486448,11974248265766226691,131072 /prefetch:22⤵PID:1036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1980 --field-trial-handle=1940,i,9189578685930486448,11974248265766226691,131072 /prefetch:82⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2244 --field-trial-handle=1940,i,9189578685930486448,11974248265766226691,131072 /prefetch:82⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1940,i,9189578685930486448,11974248265766226691,131072 /prefetch:12⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1940,i,9189578685930486448,11974248265766226691,131072 /prefetch:12⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4516 --field-trial-handle=1940,i,9189578685930486448,11974248265766226691,131072 /prefetch:12⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4672 --field-trial-handle=1940,i,9189578685930486448,11974248265766226691,131072 /prefetch:12⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4724 --field-trial-handle=1940,i,9189578685930486448,11974248265766226691,131072 /prefetch:82⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1940,i,9189578685930486448,11974248265766226691,131072 /prefetch:82⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 --field-trial-handle=1940,i,9189578685930486448,11974248265766226691,131072 /prefetch:82⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1940,i,9189578685930486448,11974248265766226691,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:404
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4408
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3c8 0x4181⤵
- Suspicious use of AdjustPrivilegeToken
PID:1860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360B
MD5054002826ce9d71e306d6ef27810366a
SHA11fc4e94c47efccd00949066426e4a9dcf9998c06
SHA256f4c62feea1d285c84a3ff4390289b8dbe0afb0b7e0be1a8a0421afb36ab9498b
SHA51275d9addb21074764cf90b034e761aae625968c0973d76cdbfe13ee4099e62d88240989e724c3703b6a4cb59c8f90dea3f4eee2ff76b022bf7d53aadf296f8927
-
Filesize
5KB
MD53385f9df9357a15d18dc9de8d7c95907
SHA179597e35d73f839baf3d76d8cdfbbfb9f11f3613
SHA256ffb57d15e2e1f966826fdc7591dc44d3c5b836ec2a8d741168d8b57be5bae9bf
SHA512570566da84a6d5f0d1aa7efce3918d8821da57a0b5540266d13eb1fe4fae01f82f4b2c482ee5b6e72e80b5ba933a7de3d360319863976e6dc17432db75fc742b
-
Filesize
4KB
MD552a32e7264d3af7b14c3bbf4e5c1c91d
SHA18e96d38ef4584f4185452f4928f73894a4aeff77
SHA256b57f63225e9ab405f9e7ad2296e3b57cb98050f2c95bd7cd5d10d637f399f39f
SHA5129a197674ba8d1d811e1604693bfb78c7a0f397a3776b9595c8d6a5cd65da0a18b76d109646706c3452aea0e032dcd5fa7900064dc66477151988da7cc5f86cbe
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD55fbc8c6ade3afebf3c2bbed948774f95
SHA1c57c030f645204caba19c5d36295ff5d8b8ba604
SHA256cc846ce996a9d89f7baff9e3053f0c6917f661586513101441b484d58b7475a1
SHA512a782110c19683cf16414a14b9687fbf8e0db30c14019cda6b6cbd7e1fac38abb7e44d9d6c75483ded7da92b44d1371675a5a25f6bcc485d71952c483425d0414
-
Filesize
7KB
MD5121b12951c5609ea9a4a4b049370438c
SHA1ab079606147cc6d09892ce47416ff12523479e0a
SHA2567c4aa11dd17bd26df128360ce6db7175e92fb32e22cdea68c4bff7c240b68072
SHA51240340f11c18025a7f6df4296fb8bb713f512ba591d03e55b2e039092042fe014b53004eccb8a5b5f41d73f3d06af3550315b1ae6f9e1e1201c98ae72dc2a8469
-
Filesize
7KB
MD5429f478b9b7c7c99f5e6d23ef2d06c17
SHA1ae1bf60396fd715d7da653d50619b079db9fe241
SHA256cdaf0ce04f72409d14a3e4a90058875ab978e821c8e6293c6836b23f6f510356
SHA51204d79ed23282566cd2c13d64f54e480ca3b41f63522a16205da9bbf028c976b5ae15c1eb8f4161773e9cb9084318d1a318a3ef2c06ef0069e603a58df12dae49
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\0f4c87f58e3554965c14e5072f508889705a6c84\index.txt
Filesize70B
MD599dadf0052f541dcd190709b283b99b7
SHA1719b21d92bea08fd79d683d013b0f22458fde054
SHA256c0303cdf79415fa96eaf952164a06081d92100c4e01e62dd640040c0a683c369
SHA512aa03b544b2d4ce59ad254bbb496f128204ca6ae2103e86a6f1b9eb1e16add1bf793798e1bb7fad490c66582f452fcbdb06b323367f6e4aee1736ad2f287d4068
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\0f4c87f58e3554965c14e5072f508889705a6c84\index.txt~RFe57a884.TMP
Filesize134B
MD5c54524d96d80daa90f24f8bfb111d189
SHA16f8653c0074460ba170bdc164fe7615fa971a9ef
SHA256bd9fddcdfbffafec3b046f50c313c8bc8039b28d1aac5a46dc0d2e53a10075eb
SHA512717d026d62eaa55bb68ed5697c2825220eb1b16007b9c12cc9e2f62f84c98665244309434f89eeab6fdbe7a70c5f807199694cb8e7526f6f751773a148e2e669
-
Filesize
144KB
MD5f76781e8d28023b6617f8885cb033147
SHA1c48b7bf38c0b09acb62b5d1cc232a0a73a943496
SHA2568278a06f3125fdefdf79fff16afc97fd95b7884757a0b7df08c5990ad3609ca9
SHA5129b35c74394d4f6fe1309500d209809415081ab92d95056cbba0e94bb2ed44ab935d8b7cf74ac5d113db45be7ac994bd9dee043f519d28043f2788b666e541fa2