Analysis
-
max time kernel
389s -
max time network
388s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2024 18:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1SIN52ZeHVF33ulF4FwrJntqmk6vxni6W?usp=drive_link
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/drive/folders/1SIN52ZeHVF33ulF4FwrJntqmk6vxni6W?usp=drive_link
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 2 drive.google.com 4 drive.google.com 5 drive.google.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133673568541896014" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1194130065-3471212556-1656947724-1000\{9AF629F3-6234-45F0-847C-A13313E2A571} chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2176 chrome.exe 2176 chrome.exe 3000 chrome.exe 3000 chrome.exe 3000 chrome.exe 3000 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe Token: SeShutdownPrivilege 2176 chrome.exe Token: SeCreatePagefilePrivilege 2176 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe 2176 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2176 wrote to memory of 4884 2176 chrome.exe 84 PID 2176 wrote to memory of 4884 2176 chrome.exe 84 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 936 2176 chrome.exe 85 PID 2176 wrote to memory of 1352 2176 chrome.exe 86 PID 2176 wrote to memory of 1352 2176 chrome.exe 86 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87 PID 2176 wrote to memory of 2324 2176 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/drive/folders/1SIN52ZeHVF33ulF4FwrJntqmk6vxni6W?usp=drive_link1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff98354cc40,0x7ff98354cc4c,0x7ff98354cc582⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2416,i,7702492011130171254,11453753359525156728,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2000 /prefetch:22⤵PID:936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1892,i,7702492011130171254,11453753359525156728,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2436 /prefetch:32⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2096,i,7702492011130171254,11453753359525156728,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2596 /prefetch:82⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,7702492011130171254,11453753359525156728,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3120,i,7702492011130171254,11453753359525156728,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3748,i,7702492011130171254,11453753359525156728,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4852 /prefetch:82⤵PID:588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4528,i,7702492011130171254,11453753359525156728,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3184,i,7702492011130171254,11453753359525156728,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4412 /prefetch:82⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5204,i,7702492011130171254,11453753359525156728,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5420,i,7702492011130171254,11453753359525156728,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5584,i,7702492011130171254,11453753359525156728,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5324,i,7702492011130171254,11453753359525156728,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4400 /prefetch:12⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5688,i,7702492011130171254,11453753359525156728,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5708 /prefetch:82⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5724,i,7702492011130171254,11453753359525156728,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5952 /prefetch:82⤵
- Modifies registry class
PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5952,i,7702492011130171254,11453753359525156728,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5944 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5072
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1068
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4400
-
C:\Users\Admin\Downloads\March 26 (0.3.368.0)-20240805T184054Z-001\March 26 (0.3.368.0)\Roblox.exe"C:\Users\Admin\Downloads\March 26 (0.3.368.0)-20240805T184054Z-001\March 26 (0.3.368.0)\Roblox.exe"1⤵PID:4644
-
C:\Users\Admin\Downloads\March 26 (0.3.368.0)-20240805T184054Z-001\March 26 (0.3.368.0)\Roblox.exe"C:\Users\Admin\Downloads\March 26 (0.3.368.0)-20240805T184054Z-001\March 26 (0.3.368.0)\Roblox.exe"1⤵PID:3508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\45036e0c-6861-42ae-b912-3a2db4d5717f.tmp
Filesize10KB
MD5c7cb8521252d88394f10921162d3af98
SHA1385c6c8113a66cb8ad11f36c600845e999ca542c
SHA256dac1c09606dac6eb7e3714625a38fc0e5ba737a604acfb37bdbfebb18aac484d
SHA5128bfffdfe88c9b0ccc482246b98d492e22471a91df5b2e94c77ab32a2aa915028d075d908254942763f105d2355d97c7ca31de0cca6a6f49945e0050adc98dfa3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\79d54b31-71f3-46cd-86f7-ea0f52a05520.tmp
Filesize10KB
MD55739c7a94381a2771e9972a1e96c6ee3
SHA1e25c40475df6bacc0415dc851c19a01ccfcec410
SHA256fbfb44f2d01456aff70f86b8fe38377dfe9202baa923a1ead8fc792f76503463
SHA51239c010bff2f5f84d6329469e0677b5977e5ecdf3b72fb47879dbe5f3f77fcd2865e3410bcaaa3234a7074344b7fb3401b54e4281f8cebba02c331aad450f718d
-
Filesize
3KB
MD5c9c9f27f2dc4ad657a3ee55a3ba3c242
SHA1b5a8adda712858cd875857178e7de16b130fd50a
SHA25663eb49a912db232e1084817f53b5208ea48367e80a99881b019312c6fe2d5643
SHA512a5095c17cbc43cc3eb343db7a973534c7416cdae1da39a025ae011f51f96f97b7808525385a9f435f631db6e1b6eedd498f64ae77d38bdf9e21409e5ed426a20
-
Filesize
960B
MD566eb098b13b0ab3bed14c55c4e460831
SHA1185cda3aa3477c5d3fc6ded2ae817ca4ac29e88b
SHA25646a88e906e8bedc4aee44d959b4ee97910221a15461bfb72013ba7cfdcdc679d
SHA512b1800a1cc31059c116e19c618c3b5ff21003d8bddf8e46d721af0303c8b4f941ff819f152447feb0c2cc0aa1721d6fdc0d3259fc53dab90e44567cb4fda8aa3f
-
Filesize
3KB
MD53922a2f4b59af5763bcd3a74f62f5713
SHA1e71b128a48dba12ff0a77b39ddac884ecef560a2
SHA25691ec927bcf49123aa402ed1e2ee94d172356ff1156e74e0d5573df4275122d34
SHA512033243789d8715db317a5ffc27f94235171c1cacaff92647f6ed5c6a7e8dbddf5bd63c0f0bd6e86cec915f3f7ad1463f63afab966d815f3d96dd1e62e3e86395
-
Filesize
3KB
MD5a43980c4ac4a875f7a5149520b762ee9
SHA1a0a6c6ee7dfbba31db9ba8d0d0ca7f2aeccb8223
SHA256026c00e934df6a37d871f0ef26d831efb917790b1bef5d5e40dce9ef5f5f5e36
SHA5129eca8a3337ae34e3dac5632c27e59d7dc12b0717600cfa68604e9346d78fe3465c869a6020a103c98f9637e3088ebcbe6ffbc86d17181e41c02817487ecb83da
-
Filesize
9KB
MD50aca402d1be84cb869ef82f090ecac46
SHA13a82ee30827c30d36fd6b09e174c4cd3a5ea9399
SHA2560a0cbc4c43b9fdd76206f486b1e6c3a123357b9854d3387d46300c1f6af832c3
SHA5122477b3c2c5d43c08d311d02337ae4bf58e4c9263ff848713038ca43e3db39e95ce97ae66e4d2bda4106c184e3be790437ea841c60f648ef18246f387af08cfd5
-
Filesize
5KB
MD54795e0c2eec6cae5d378a03c89cbad47
SHA1582c465e5f7b1d0bf49cc090c6bfb4ccd28998e2
SHA256925ecbfb11ad43452ea042d3b8d65df7d988a39362f3136e4bf31b93cce80fb1
SHA512b7c70f5d8b2b9c48b0760db0b8ac8bb3eea757d751b1a203815a99fa7ea92aa11e4e72a617a0059f17eb405488470adf027c6d4c132dc9c5bdb75769f901a0e7
-
Filesize
10KB
MD58c32c2175bf2e4b355d353cf10609015
SHA16c5aff31e76945c608520dc8a4789a35aad914f3
SHA256890fd7ffaf08b45918c3ead50e6d89adbdb0a66d6580c7cd8c4247f1458c9c0a
SHA5120c38155fc5d71648d8c6b0acb53ce571ef9205e0252cc96c06a7ed383dce5087cf10de82a50b4ee57532d975bbbcb3ee6cf905cd73ec085eca88e3a14e10d13a
-
Filesize
10KB
MD5c22e3794e3c5cd080ded984dfd3bc22a
SHA19a2c3b4fc533eae7b2a59e4757678b4a931b3bb5
SHA256bcbf9683ead5e32b9511856f2106ea050a3a84872fbda083eb7f44bb50d30c9e
SHA512c9e3486cb2de6d085fdd7155ad3725383f957e57260424ff90c78206bdc7db8c6b81ca65a743b448fcb117462a26f80c4f180ba54da293c690432a8c6c529fab
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
3KB
MD5d2164190aa582533337a7074ed1198ba
SHA1714b3e09596b39b3f00279aced303ba6c42148b0
SHA2567ba9e652bda66f5cb6783af0884c6ca3aa4aa540e6a0b4bbcb52c4915f025d4c
SHA5121784270b5ba1ca433983bec69f429198deb0edb83ec613725c6a354b5b6db5bfff13f5397bf905a07fe07377b33d3e7529c78359241094c0ca200e6fe70385da
-
Filesize
1KB
MD5f5008d99b4304adb83052c6742e8a992
SHA1a78282a096cec00f201f610112ff3f454575fb05
SHA256faa721216c424724b8cf23ae3fee90e390d22f982cabb631e0ad6231a66d5d74
SHA5123ac2828519cc89570e42672951538f1f8a5b15a344b4eaf04840959718f92338821bed19e60c40ac798db4979eabc26f7b6faa40f2cd259a3c540023b954e847
-
Filesize
2KB
MD5fb8b2d36baaaaa7cf755b09eec0d14c5
SHA1202dde319f30a605a3b40df796a5a247c1f086b0
SHA256abf5aed110317744e2a96123a6662256179a102212191591218b5e82faa9c586
SHA512596ebee0318afc518dd520129c2b2e061b98c43db26f8f4abefc415df2b99443066f505f2a028c338cf2e767998ec7a79995a555b299a0c08479b573c4551bbb
-
Filesize
2KB
MD5dd618cfe0a99eba01e5407d646666c4f
SHA148ab7f92e6e929e1f71f07bc496a8c0ff5fbfda1
SHA256fc96684dff7174b0a528781059318d13eae00f83e0dc7c7d5f5b082931225c6c
SHA512a7cefdad49b193745e0470cd07986d8fd748c3d1b882688f27d870c9553e3c27f153c00df425530f29014aaaaa838ea2dc968710f2f95240682379abe91c4978
-
Filesize
2KB
MD5c3bda09ad6f0b025aaf2513e1609358c
SHA143fdbfce5f476cfd4cb4b1c2ca55d47bca9fa65b
SHA2568891e26f8847f03bbf3f6efb0a8d1cb2c94c9fe8562f81df6e49e27c5a87ae87
SHA512db19f35f4f413c0ee1dd1a46acf7d834a0be94fd3740175c3e7d771dba3854ed99c76a8b9be694e47eaca054e5a6d84a131174cac3c25bf8e19874b6dab80d99
-
Filesize
3KB
MD5903f7568d920caea820bc02f2a1e1b87
SHA147652151479a6e34fdd7a19f258c563814dab134
SHA256bae7577dcd9905c6638980f094db3c3fd1cc2a6a43e78c95bd60e06412e4f5d7
SHA512da83da19179f00350389c70aa1d922af5c97385f5a3887ec263dbf2c3ce2409bd7b0ce953d2b733ee8350e5f7392099c3e71a171edac55a0ce481d6827302c44
-
Filesize
1KB
MD513f8b48537518050e4b34054032c3ae9
SHA16163a057c4cbca1ceaae095f0352847d87b448ec
SHA2562dcac7d650971623a818154ad0984d0ae30c187cebd189acc4a436751f1c27b9
SHA512ad01c98a7f60dfd45a4f05bc5740547331815cb34f26eb2417b07ffcd7cd47a3d58b7f611122b36a5b2f128932200c6eb630c3a72ffb650c1f9d0b45dcab8503
-
Filesize
3KB
MD51b2f226acd011b592f749b77cfcc033e
SHA16c72e8bc7025a9b64bcafa0c7346fc4265d8c672
SHA256c1e996e51449cba8b6792bf36c11f8cb7fa3667e25f33e946421f33c8b85e906
SHA51257ddfbda959809d82fd1aa26a53a4dc906b6efec550f12721376df9c7206e8d26abe2813b31c3397016b5bdc7c6354c8a21c8c26cef1b404eb7d5b6d1aad5c16
-
Filesize
3KB
MD5e24b2da7b488e115ee6c75ca9f169fb3
SHA16b462e4096547062e9bc78351811ef0b5298a576
SHA256608babd717340f001f6ee4fe96ed5fce5dcc5dc0d12e63d19f2c461ee9af7bef
SHA5125b0a599bd50b1e025103483715a5ad175107fbb4adbdc0079f6eb776cf91c13ffd227cfd981ae6c51bb2a84d9470b826130d225acf9554b62c8c051b4615f9ec
-
Filesize
3KB
MD5341c92075b503a9cc17b7bc8c86fba32
SHA1d5122475bb96259baa5d7b81aaf7a2f59b7963e8
SHA256576d356c4743f36da24632097617808005921a35ba0350db9c7a7eb8bd28e635
SHA512921dddd73df4e8f9e122113fea2737b9b8baef6a82f400b7b3ffc42545d32fece77ffcf616a53b5ed077421d39b9e3eed133e62da41e7426a32bc7c35542c209
-
Filesize
3KB
MD5f8bf389970900788bb83b6d6f7bbab39
SHA1e653cc843dfde9faf6e84577df76347985da4564
SHA2567fcc4d1aa94ffbe60bdedc8d3d82850acd0232c55e087cc19957d8ffd1b44ca6
SHA51218190da602b87a4f7de69efe20c5785c25b613e7f6dc990f712c54066ebe758dba40c2fbf5dca59b2848d4ff6cc73f1d113947de471ff483326d5c55cfab72fa
-
Filesize
9KB
MD5e8a29525de1631a412bbdff98570a559
SHA1252363f74e86dd43063bf65333c89dcad6eecebf
SHA256609b6dd60c8479dd3883f71d0dc57765eae0d47f55c4f47bc9d9d97bae0d084b
SHA5125cd9daff1076f15eb69209e3f3ebc21eaef9e6499ea8afef39da14c2750f3922f0218d3d6d180734d8d37f9a0cc59682358d3c2728ca424c6bdae6da3c5be5e1
-
Filesize
9KB
MD5bbcf7cefbe20d294acd9134486710637
SHA133039cbdbf1b53b8e80f5b536d29cc0668391a33
SHA256359228466f48dbdf2e60bd6f3ea758409a2a4f66c5961f390e82867bb79f9855
SHA512472db7878f2724f933368e7f1d2e400bb87234606a37d68ab6f03eb6823cfea4d5269627c8df7e03c4422e91354ef44270a120e57d0aeeac701881b2e2592b70
-
Filesize
9KB
MD554440b4f92f29e57154ad64e62e46092
SHA1816308c6f378b900b5265b546cfe98808dcf920b
SHA2563dd2ce0e76ffe9155a3e4c7de44ecd05165f0c5c513ca689b18b1356d8e7e343
SHA512019a843de866f5daf2de0d7fb0117fc9ede9c54f78867e8bdd67b574c1e3d61a1796be9f2a7d95ae42f90c2a3ddc77db90e7c06ab2bf605ff74e6fcb4b1bca5b
-
Filesize
10KB
MD5d534556612dbf75bc128cb98f302ef8d
SHA151bf93a88e8ef4edf1292f3ef7fd62d799c5e9d7
SHA256ea813d52ee5d4f84b988022792ef99ff8cc5fda01d797dc5cf18c3feeb78cb34
SHA512a7e1f6bf91a9e6f1bdbca40fa32c7834f97c17a549bc7e8b0d7a271962d8c94f086936999e5c9f040fc22462eebc2ab1eb72cda54d448508bde18af4345781e7
-
Filesize
10KB
MD5d1b269094ef18b10832c9ebabf35275c
SHA140fa4da16796b54444b180f6ec0ef4d62e9e323d
SHA256d8e912d87d456055070c3850de5a363b91f9e6b49b52bdcf73aea7de520d01a2
SHA512afb7a1a6dcd4f956b840f2671d2319db110434405a3202aec367a40ad1d0f7b114e3799ba59e46d075095c3a53a6fd8cba3cae9728de7b72435b8c5a03fc5c35
-
Filesize
9KB
MD501267f4cfc0b3d84a5f00e616afbf2fa
SHA173d04a6b361598fd9bb85b8d3cfb7c5dd77f15a1
SHA2560e432aec6de2a27ebc780a6f8bcc947620d7a0001c81481403819cb58ad955a1
SHA5122915f11fabb52df89e51e114c889e90274a312f4ee29e97c3f3bb56e3643817e88c933016562481f4796ddea0b9dd610197d25e1d8a518b43680171e930eb691
-
Filesize
10KB
MD51d97654e72cd21b3829d2cd39733201f
SHA14add5da9e06e40ae9899b87ceda510ac793e7e5c
SHA256f0adbd989d78bc7df2376d230c6db988d41900bf5be65e9ea9d78d2b4a14f254
SHA512c51c42bad521d4f134a8117a6c1605ec0eba578e181f8bf7aa85d8392549756e21a292d2ec740a7075f078612ae11c69920482f3712be23fa415d3ee0563ec73
-
Filesize
10KB
MD51e29f04de409880a837f6cbe800f34dc
SHA16a567e136ab5de603d6ac9eec2bf05ed9953c0d1
SHA2561e4e78c691696d19d5607fa81ad126b5d717be61b658e306d99189a06093a733
SHA5124a52beba156efa7bd6455bb149b16880f2b57133cb2fb0a4c7b59e2e0bc2c404caea7aff36417a918962bdd9b062d9c8b1a257cedf5a870c0d7bc9187d8cc611
-
Filesize
10KB
MD5dd4b39e37f3f774439990d87538b64ca
SHA1dd6904790c6168de2ff3bdf2a3517bd9d452455a
SHA25661fbd16deeb521cfe0a071503707c52c7ab57adbccd18dd84f08bbbf07d0bcfb
SHA512d038be81d6af7673642251fdd5c771c131641c019900ff51f009a47d4a6eb6d3a8f886a383fae9a691a47a2b614489cb08ca393df1ca345540d1929287986a50
-
Filesize
10KB
MD51fa882e739d1144e323e88607b22742b
SHA183fd7da905f8fce69124b149c56f5030e2d47632
SHA25691ba1f10fa026ab398f341cf89765f02c144da96617d476cb9a97aa71aaa4993
SHA512c82c283558377060638d65221c6ea88b90bbe48e62d835afc143bda50450a7d77a93cbd23401d165e3b34b9d2e7ee53beb76d172ff56d710dee0bab77bdcff68
-
Filesize
9KB
MD54d41d612db6c77fe404d2459a6a4c2b0
SHA116a16711024a93b84228392830f601790067277e
SHA256ca1788cab3e466d44f1fe0d0366d36ff281fc2d907c40b038685022855766a3e
SHA51266d3ebc8c567029988d72076178b56625f4ce6b7559270774a2bb4a8e50622d5e6c977e4a6690e8532fee19b62c87037cbfa7c5bad5af567ed46d2fa52945699
-
Filesize
10KB
MD5f2c883711b68ca4640ad6a9b3bffc45c
SHA1311fd8e9ce0db46a893d9b472492a0109634ed63
SHA2562f079907e06749d220c9caa4487b4fd4c0b12ca1a8598899c3be9819589ecf49
SHA5125fabfbdac260047dc8256371f680c073afded6f09aa3c995d16c81050544944b3680eb30ed5b436c222194fef7dfbd4d1938ca5f321ea473179d55fcb756e071
-
Filesize
10KB
MD51ca1c10cb2b2eee7ddfb546ca31f403e
SHA1847a23716fd0511d8a463442150e1dedfde07953
SHA256c7118295cd984bbb21b432d9fe266998565ddc6456e36bac38ed9d25a28d84d8
SHA512fdb1f6be0a9d7b76672511f4f877b23772e5713bb19c159d1240e9b481eeafffa1524b282b273c71d26de8b4948e6b606d60c6918e508032780e73c5d9777fec
-
Filesize
10KB
MD518865f69408fd65189a7b05baec3b620
SHA18453c1b9e71efaa5dc2183696318463c255dc437
SHA2568133db00883156dd76211046bed479edb10091d4853e33f43fefac38a8852cc8
SHA5128040f9a7294a750bb47c28fdb0bbbfa187d3a89cbd9c09c8b6cfff6162fc0a73e5854e34fb6c4753c755e4ce892a7efb02d5b9c228acc88bb93e28d1a0edeb42
-
Filesize
10KB
MD58c5f1b2149f67dadc0483c87ea883647
SHA1453d707c690e87a6e1dc90bf6c2295e97de6f1e2
SHA25625f0650cf13dd3bc4e0360778a0283798bc5c36c1270587fc84e994df532afa5
SHA512984f86520344c110cf0606d81345a665e0746ab2040cebc745b2b034d8ede3b8863622ade675eee7bb417f552d7601467dd6121cf66fac615b2b0b86c45a4048
-
Filesize
10KB
MD5de2fa5e2b682e25babf28212c7a71656
SHA1a87cb49baf5725f8a0cca665d548c85e7e198574
SHA25618230dd73f5324277b92491d380ba70bef8a7dc2cd5752b282c88c72d67a5b16
SHA512694e6077ce6a222903101d651df0df2a10dd51f68c7873116266bc82d0f5d0c99c51d14c797c27be633406ff06c0b1214560de459a58f51d81d298f44f9b26a9
-
Filesize
10KB
MD557465d37c1a5420a4acc7436c7217d3d
SHA144c78c11d01cd07c34a67a55599df4fa80d6c384
SHA2568d8cb3079a4dee54959cf0f82f37805b280fe4fcae4b5ae4bb7528f08a853b1e
SHA512b28958a96651bc8748cc99fd4f6791c5413c32314d32da4ec867370080cf0a50c7f707dc3ff66eb0f3711b5651ce2c4a4083bf41801caa743fdf6f0bf9e66e74
-
Filesize
10KB
MD5bda8fe07f2966ccf88dd228437d21656
SHA195ce999bfce758f4d1dc56ad2f7ea2ff938d611c
SHA256e3d3a78666080bc35d8d1ce6744b10210e4897fd82d1645561642bc5d6a27196
SHA5125a174bfb80dd9c5c2a847395aee7e6db23b0775e6e5a86d09883caf896abe2b11c52e860eb6790a4f0d030186757a9af4f8661b8283adfb7d0f6d07a5abe6172
-
Filesize
10KB
MD5242f7c71bb3dc3e8921e8fa903ffb217
SHA1c593abd6cefd75616e53d1abc9a68b4265d7c1ac
SHA2567b8b92f7be3ddc176efe209ed51b933fc411f6be231aa6423f135f06a9716e90
SHA51234b402b25338278ec6b6583748f5dadf36fd04673fe52242e51d9feb071d9d763389b11cb1380a4b67f258bd8bae475875732540325d316c02ba621b97401b3c
-
Filesize
10KB
MD50a2b35e8d63ad1522499692f16b6ceec
SHA145122c2c60bcb1ae4e24bd8f2ae3a066c2224367
SHA2569e75141019b80c5d83454f91f1f92569674132f2c3f0d9cc543b602c938a1c3d
SHA5126813d93ba2ac30b0382f753b92ea7a7af9d89b8aaafd62261f6996890f1cbf7d9887c2b5d134fd82246dc5e28b6d0f26b63ed9e5c2dccf4845592b37b4118f27
-
Filesize
10KB
MD5a5a94bafbd197bac39b6fe3f30ed67e8
SHA17b15c4163ec4641f7abe9f1ffb1fcac00609ecd3
SHA25631ab1d81308aa8e7f9d82d885f93c86410a15a47610c995be680a8d01a53aaf8
SHA51260c32144387c1df5aa8279d69fe3d102a695d7f738509150d9b38220a691ed7b3a003d1772e1dc537fbba4d87e1ab9a99c2c17d61efdc8d3ea94d4c2c14bea3d
-
Filesize
10KB
MD5aeac1a132fd9861d7a7f26d4ed57b090
SHA1043f7c17f4ddb020e882d946395d3352e4d1c8f4
SHA25639a1e714420b03ee7b82daaa6737751c401b4317be023fb014118f49f4ad4917
SHA51241e820f31037af0b96082832beb8caedcacce3b22f0db89e385b2c29026c0f39278a5f54274ebb31898c2f524a321b5e2c3a0854e104f9c48628669b3b93a83f
-
Filesize
10KB
MD5d99e1689a96b0b065b5972eb252788e9
SHA11a65ed0265ce4c837fce4d945dd7e86c548794a6
SHA2566878bab038da20454d35c0a842899fb04aab2e4cc7453b0e0be2317ed7487f09
SHA512440370688c936a1e46f89ce79a34ce5b7442d79f58b16e07607a917446b6e6e6ef1b8f212580cece65a458d60afeb48a3b4f1cdca307fae44a05d371be6d8317
-
Filesize
10KB
MD5d3172283184a82a2b1fcae7c02ebd42e
SHA123cbd3bafba9a32d6e96968ec79fb2fc11cc5e26
SHA256d01cc62afcbcf2cdc9d62ce715095db076b12f20f3f7d444f53409c74ae4d5f8
SHA5124a06518830c14cf142381ff1f851d20dbd2aba10036b8c2c8747de9c319cbb1bf3214d66ec2f4d1d74f41d35b4343628a18689558a1ddb7768b649042b1d5c21
-
Filesize
99KB
MD58b816c36547bcd83b657d817655a44ce
SHA1799ea7cfc05d4f8e8ef0a40aad6641b87c1de7bd
SHA256effd686aa0eb58f3455adde6dbf41fefeb9bf6f1363139185e37225e873001b6
SHA512ef18cf78d548ebd04fc685b80b3829cd2ba5ba6fee184c88caaa384ed111506cc5aff0dcf27ab7005a43631fb5421793c1e89b774ca31892c428b919c58685aa
-
Filesize
99KB
MD5d1ee2031990315ecce2377e3b51cbe96
SHA13bdd04723ac0c720d933afd8ab9a8bc270cc7fea
SHA2569a26d8c98320931955102bcd135a9492971c6b6db24284c558a7ad1803532a70
SHA512082d720c4f9dc192e1eccc68833f8de51ac808beda2c283af6f7476168feadacb04a86aa3ad0ebf051ff218c4f8ed5cbcdee5f60979887e4b7e70d1a7a62d417
-
Filesize
99KB
MD51e954bfb04d8bcdf281b33d280143009
SHA106a48a6e0c4e845bab73df4394d9adb07e5dfe4e
SHA2564e9a0d94b650486e1c5f7d20ad2611c0b562e0275cfaad2c42bc994936917218
SHA5124463de2a0bfc2b17f79081be483517f8d22b7ec0b2ef4140d7eae907a08bcbdac4dc0b00afb30b121ef6cc994c1e1a431edb8e6b1c27712223f7a18a1f0235d6
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
5.2MB
MD5d6faf97c3459b32037bbe6569c90d0d4
SHA14e0b618dc80a316ac8b68ee4005ada6ca4650790
SHA2564a5efb7eb5b83feecb3d67ca613084adab3bfa7bc5ab00eb33268dc20aaa9a62
SHA5128c874f45743d1549c72ca098ee8b0420326489480b82e467807595f6fd33416a66a4fa7cac73d79552637e1efbcb70ffe6664a8da107aae2168c76adddb47afd