Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 04:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://friendly-periwinkle-grasshopper.slab.com/posts/office-365-0vava13n?shr=NX9JsNPcrDsE42yuTuaByu8m
Resource
win10v2004-20240802-en
General
-
Target
https://friendly-periwinkle-grasshopper.slab.com/posts/office-365-0vava13n?shr=NX9JsNPcrDsE42yuTuaByu8m
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133680823182888581" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2380 chrome.exe 2380 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe 1948 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2380 chrome.exe 2380 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe Token: SeShutdownPrivilege 2380 chrome.exe Token: SeCreatePagefilePrivilege 2380 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe 2380 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2948 2380 chrome.exe 83 PID 2380 wrote to memory of 2948 2380 chrome.exe 83 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 3272 2380 chrome.exe 84 PID 2380 wrote to memory of 5112 2380 chrome.exe 85 PID 2380 wrote to memory of 5112 2380 chrome.exe 85 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86 PID 2380 wrote to memory of 2596 2380 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://friendly-periwinkle-grasshopper.slab.com/posts/office-365-0vava13n?shr=NX9JsNPcrDsE42yuTuaByu8m1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffab639cc40,0x7ffab639cc4c,0x7ffab639cc582⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1880,i,2411913871909845334,14053029045868541763,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1868 /prefetch:22⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2156,i,2411913871909845334,14053029045868541763,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,2411913871909845334,14053029045868541763,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2424 /prefetch:82⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,2411913871909845334,14053029045868541763,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,2411913871909845334,14053029045868541763,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4600,i,2411913871909845334,14053029045868541763,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4616 /prefetch:82⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4828,i,2411913871909845334,14053029045868541763,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4692 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD58874d3654169c26ca3fccda14281099a
SHA1b346122724a2c273db3d11dc10e7777b6f670a1d
SHA25606839525c060985081c360e9bb3507ffeb79d94b4e8e2e7dd1d4ae7a52c3083c
SHA5124321e97aab9db4fee37aee4ec6b3201bdd25707eeab607af71d23f7612d95e6ad5cee9c2d2dbe1d2135c02c66b729e51fcbf1d7fd6450efd1b8f060648801adc
-
Filesize
120B
MD524b0cf2b192f8b38e12e8bc00c0f7201
SHA18f08eba5309c414777424f5887df15e179b61fc9
SHA2560c69efa073f3e570246f8a00754647f8efcd268be3b231b2ce3288e506966a5f
SHA512b7090ef90f6997c1d14cc99c374b976b83e149b186b636d25b3a8e3239bcc02198757f6550c601a8f1d15478d025512ea58aa46fbdf22cbc6929f236b7de96b6
-
Filesize
1KB
MD51a69e79c38e9137feed4bc0e9d55de9f
SHA1079c66157379511051976353fe182f54c328b490
SHA256e96078e969da9d60d91450a4a4b7d4acd0b475ac734c0c592faa388a4b107fcf
SHA512c642c3aeb219cca60df05c4db788dc76563df63b38a3a1903ad67853dc4cd3e3c3ca174c21f0a56b9b24114c25577aa544629a8549beef713702e173d7033374
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
684B
MD5eaa69ad53d45c4869b6b03307b9cc2da
SHA1f76346f41c019d9c68e14e25d1b88bae4c71f514
SHA256ebe919b47cba8ff77467050d6492f4db8ae16c54270fb20c3b402805b28f7dd8
SHA51216bfd570be5e1816f1250b3c54eadcb42e244e8a3640b8ab28897444a21fba00b46c1a65bd46c98567401dea2bbe5fd6d27e2050e34e91a9e5691d61ec46d8f8
-
Filesize
9KB
MD510105a4080f1ca0e02f35435518778af
SHA1998365ec7d3074a67a0c4de40e140f543e5e4cd5
SHA2561b070b975ac7d8745c5a2bab1676515aefbc3a7387816352a49076906855c403
SHA5127d92fb069ed034a7e6c1130d0d7e4f753f12b2d3d5ec947f8a2210d2845fbecfabaee0a97d19f1151497be482864e1664c2ca7248480b0c3d206fde64db68b7a
-
Filesize
9KB
MD533dcc52bd061aed45e2075bea08ce629
SHA168fcdc061103f30f6d09e1b1d6862ca1bb703191
SHA2561149e02b4bbc91990c100e157f6e80bffaeaf57ddc3b260f8b75bd73b4340691
SHA512a73a622a7ed18bd83dc7fa1d79ef05f542cea98977e8b30dd404e4fdbe7058695b1b4a5347d33e162b7a659ddda2c2bd20eefac8923ab21758709532bc8bfe30
-
Filesize
9KB
MD510656b6413fd76fa9e5d14e7436b163c
SHA17707ac25cf9535e391440f31c82f8e18f3f2e108
SHA2569f2397329004b2899a921ab0eaeb4917bbcf6fe7c90172716941541cc387d91c
SHA512cd028739773cc77ac64356f0403d0b7eaee7a1fa7a4d93094f3f20dd9d379e0c416e73a87034519345a17ceebb29b721e133ad9c0342929a00eea050200d238c
-
Filesize
9KB
MD53722354d5090271ba0eccae5515c1b74
SHA1acb6e3a3f20bc197afdf28127ddb4e9ea16451bc
SHA2562fde38bffcbb3cd96b7ea8a6725054fba4257e8bb10c1571726a2ad621072b76
SHA512887ae345910d12a9b7c9a16ff2e81c9fc8de47f8cd7cca4059c86a8487e811cf9c4153046fbd56193f4a992a11ac5e5a8cf51c00ae2d5c1c3b091780e7184eb7
-
Filesize
9KB
MD5f7eddec009907323ca3892ea80514d0e
SHA147214d9e31fccf1d93e6f382dc40def483321fbf
SHA256ec3c86ad07beb10dfa7277b451482c712e401b1578a1fa9052f9855185e540d3
SHA512a99dbff6e1aeb504bf6048ce241359dba8cb0947980b8baf8c722ddb9a6d2e7f45bac1e97936938fd831b04ac34f28b9d9f33185745e23e562bae53e2f36c9bb
-
Filesize
9KB
MD56510f11b53070f00b834dd0f99983c9a
SHA11a49cfe9cd3d5c0c191c42d49f8cb5b1d2828e0e
SHA256ccd0b3bdd4b71333c36712c26abdb8d4f60787dfc488665dacb1cda838399b5a
SHA51213fa57969dfb1e19d5daeccd95f0c72d430b4c1ca2b1283eb97343d1cb7255c4b012ebaefeb1709f3b9d4d27712f7586464ace3d7fd397995373f38cb522499c
-
Filesize
99KB
MD559e28b30e21e5cc177ad7efb9506c1ed
SHA117b1e78e81832b22046dea119be60899b34025d4
SHA2566e46cb4f69d80643410ff3b4a8a48dad64edddd2dbade279783ba87329e205f0
SHA512407dace9f5c6757e58bfdfa8de46ae9e2517991f36bd5e19d1d2a8ca171d487d7d9b49e744939334ba9d40a72c06098740d704417511ec7d59d5edbe5349203a
-
Filesize
99KB
MD552b09a971ee445bd2da9253ffeefed22
SHA1e0ed7cd789525b31e19d27bd79b531caac994bb0
SHA25657a93647c40482b33aca35e6a9f39a04f1eb2f0f305654314cea588528a9724a
SHA512c9a9104173ca9c5317284f051ceecfdebb7224dc4fcf94973fb2b167ca638ff36aeb3c930a5e4ebb3bb5cac29de365f3d044e7c886f2310bf42aae28389aaea1