Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 19:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1LudYGDdgWaJhdrsH8ZRxQjlxh26fsVrn?usp=sharing
Resource
win10v2004-20240709-en
General
-
Target
https://drive.google.com/drive/folders/1LudYGDdgWaJhdrsH8ZRxQjlxh26fsVrn?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 10 drive.google.com 14 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4344 msedge.exe 4344 msedge.exe 928 identity_helper.exe 928 identity_helper.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4344 wrote to memory of 4908 4344 msedge.exe 86 PID 4344 wrote to memory of 4908 4344 msedge.exe 86 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4448 4344 msedge.exe 87 PID 4344 wrote to memory of 4492 4344 msedge.exe 88 PID 4344 wrote to memory of 4492 4344 msedge.exe 88 PID 4344 wrote to memory of 3400 4344 msedge.exe 89 PID 4344 wrote to memory of 3400 4344 msedge.exe 89 PID 4344 wrote to memory of 3400 4344 msedge.exe 89 PID 4344 wrote to memory of 3400 4344 msedge.exe 89 PID 4344 wrote to memory of 3400 4344 msedge.exe 89 PID 4344 wrote to memory of 3400 4344 msedge.exe 89 PID 4344 wrote to memory of 3400 4344 msedge.exe 89 PID 4344 wrote to memory of 3400 4344 msedge.exe 89 PID 4344 wrote to memory of 3400 4344 msedge.exe 89 PID 4344 wrote to memory of 3400 4344 msedge.exe 89 PID 4344 wrote to memory of 3400 4344 msedge.exe 89 PID 4344 wrote to memory of 3400 4344 msedge.exe 89 PID 4344 wrote to memory of 3400 4344 msedge.exe 89 PID 4344 wrote to memory of 3400 4344 msedge.exe 89 PID 4344 wrote to memory of 3400 4344 msedge.exe 89 PID 4344 wrote to memory of 3400 4344 msedge.exe 89 PID 4344 wrote to memory of 3400 4344 msedge.exe 89 PID 4344 wrote to memory of 3400 4344 msedge.exe 89 PID 4344 wrote to memory of 3400 4344 msedge.exe 89 PID 4344 wrote to memory of 3400 4344 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/drive/folders/1LudYGDdgWaJhdrsH8ZRxQjlxh26fsVrn?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaac3346f8,0x7ffaac334708,0x7ffaac3347182⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1297140646906139910,17701986184107749908,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,1297140646906139910,17701986184107749908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2556 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,1297140646906139910,17701986184107749908,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:82⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1297140646906139910,17701986184107749908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1297140646906139910,17701986184107749908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,1297140646906139910,17701986184107749908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,1297140646906139910,17701986184107749908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1297140646906139910,17701986184107749908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1297140646906139910,17701986184107749908,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1297140646906139910,17701986184107749908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1297140646906139910,17701986184107749908,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1297140646906139910,17701986184107749908,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4672 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
28KB
MD5bfb4ad144233248db8f0b493c9f53943
SHA175f204ac49008ca945d35db03568db5ffa2ee27d
SHA25657819395af403b8697d446c0ef64388fd0f4b33af5647bf8a79d0616cd903393
SHA5120f5f4ffdc046a81da203998f22ce0f156036b3c14646faa1b1c30d6bd0cf5138b70b3d5ac60b2b6eed36d2beadc108b78119f757bea84705ac71a8f1b3d4dd6e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD59013e105024aa06e18eeaa5a04ad8bdd
SHA14c8f44f657ded9629e4f9a914a63c5dc23c9222b
SHA25656cbc6596b43708b3e3dc7b264c947be459cbb0e63245c7148049affc3f39b48
SHA51246ef0d9b803ed6eed3816e5835c20650ff2fe2f7355bb40d554647a48d65e28da86a0c4d9c9261bf52d95c24d9c3fcc14004fe385e398fbd1f7eb47fd6976e98
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5a9ef999354c4cc98c3ade1e2ad80a718
SHA171ce5974b70779acd1cb16a6f157d4c4fd517806
SHA2565029a65e1ea803a80cd5081da43afd948a3c6913159dcd49bf8786a49564f69a
SHA5123c0c516b2a8a4951478e9afb7e516805c9aa2d324303a3bf1350c9e1bb85679143daf276e6fa338640e2dd4a1deee75dcec4b5860ab74d3a6160831c1a417c77
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1008B
MD52d1605a852741ac17c0a41d231289a93
SHA12021a7ab81141fc005d95c79f405956c8398565e
SHA25681f6156dd3b06497411422d27b0412fbc08eb267020b2bd41e86073427fdb6ed
SHA512be741df496d0e50fd20abbc7be638b3b9c3f3df810a117a9fae6bb43bb6094d4cc6cbe235386a03477226f47e2444278ab2ace067a44bded5eddc5c15b36ba46
-
Filesize
3KB
MD56394758277e82bd3da9fee23d55147f1
SHA17c2a28833ca8cd914a382791fcc019c9fc3272a1
SHA256ead5c532bbae5525150bd7d9667aec02ae8f46e1ce5f027b994a2a4a7b84c254
SHA5126ce8ad8eee2d051f9b91795ed6296fb6cf320889348979b6a3cda4633efd6733cf8199f08a4c3802bc5dd5a622986c0a1dffcb7991fe326c53cfea865a1cc5cd
-
Filesize
3KB
MD5d3bf42687c4ed7be397791d32b3e4c9e
SHA124fd86507ffc1e82057fe4bb08ac5075ffe19bcd
SHA256c46213c1ad3655c0bf8e9acedcaaad15720ae6e70c2f6d622402e14619a9a16f
SHA512cedcb9b818c11d74e1d57433fbb74f7b613e40b85bcd6081abe50b91692abbd1fa3257d142570fdf8d5dff219e1888c95aa371e885f3cb00fd69228cdba3c18f
-
Filesize
5KB
MD5e189115c41ebd26bef80533173e3a10b
SHA1affb7d01579631c6a8c4c39be8328c4862a025f6
SHA256d5008c577335f9af5f3314c416c5683d39fd7287e6c300e68c46ff4193e7a907
SHA51200761031d52884597a0f503ffb18664a2df830fc87cdd80141b37806f1e0a7d55453cbdedfc32eb353ddbc7d80e3c39fdf812263dc1ed1fa62eed36039e79ba0
-
Filesize
6KB
MD5462b3c610b4da2795fecc7f934658bde
SHA16d8209e64532f5f272322b45420e9d5707f92e1c
SHA25619b54f63d29f86c1eeeaf951c3360b33e88005c07a5f59845c770877f7d5c800
SHA51247c8ca62c956d600911a7065e0056284e71751bbba45f53831617d82536da2ff23e86447075fe1d3298507fe4ff98259026fabbd6da7954fb1da1aa6db0816d9
-
Filesize
1KB
MD5cbb5450c23d2dc5da7e2f2b54af0e7d7
SHA1c3101b8c36e1fd4343b8eb3b656de54ae995f069
SHA2568370caa8c090a341d85cb84cd389fcc951c614995eef3a53ae53c601f74cf50e
SHA51247f22adfaf38edf29b0e27a2e357ee76e43909455a852b09919b2fe734269b2e5a1370a3e38e959ef419d126bc49c81e137a9f5941e7cea622e4784baa8eef11
-
Filesize
1KB
MD5fd498693e323480a5be82a910031f9c6
SHA16dfe28cf09c922e9dc3daea5e97b37008b0d2628
SHA2569919834e51b58a5c3630c3ad9918f8d67c02fd94a52737cd0a49cbdd970e49e2
SHA5128151d0abd0a246317cfd14d0042d509d6c4cbcbcd7fbe6e9995cd3c170c2abecd4ac2966f431f2bcea3e93f54ac052909ef348221659e85ed1ca1a2970726510
-
Filesize
1KB
MD57b4b329f9aaa2a2409000d7da63c3b96
SHA1d31de083d399e83a35c6cefef8db476548c0abb5
SHA25619f28372e03adf4b77ccb7c985aa566e8e6dc58490ac53d242eb4276b1cd1085
SHA512421adf67f69e306244371854bcc864a61da3ec6917a4366cfcac7c550a3770506cdab55f4a71727e9d1292022389f1e3734fcdf55294d6ef8e778848419e8cfc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50cd56614e371e1c7e0fcdf8dbe437201
SHA1af452e530f0209130f57254deb4b9c4f30ccfeda
SHA25677fa4092479c4881304404f54f1c6219d1727eacd7a48651953dc55e00ebc6d6
SHA512be23504fe8cac6fad0f8a102df0f642bc6163954531a19877d025db828fd511effdb534462f7cabc0247a05d96c5a5b813977e4bd3cc74b6148f21c2915b992f