Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 21:08
Static task
static1
Behavioral task
behavioral1
Sample
d465172175d35d493fb1633e237700022bd849fa123164790b168b8318acb090.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d465172175d35d493fb1633e237700022bd849fa123164790b168b8318acb090.html
Resource
win10v2004-20240802-en
General
-
Target
d465172175d35d493fb1633e237700022bd849fa123164790b168b8318acb090.html
-
Size
548B
-
MD5
370e16c3b7dba286cff055f93b9a94d8
-
SHA1
65f3537c3c798f7da146c55aef536f7b5d0cb943
-
SHA256
d465172175d35d493fb1633e237700022bd849fa123164790b168b8318acb090
-
SHA512
75cd6a0ac7d6081d35140abbea018d1a2608dd936e2e21f61bf69e063f6fa16dd31c62392f5703d7a7c828ee3d4ecc838e73bff029a98ced8986acb5c8364966
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133684888941355380" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3944 chrome.exe 3944 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe 916 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3944 chrome.exe 3944 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe Token: SeShutdownPrivilege 3944 chrome.exe Token: SeCreatePagefilePrivilege 3944 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3944 wrote to memory of 3844 3944 chrome.exe 84 PID 3944 wrote to memory of 3844 3944 chrome.exe 84 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 3692 3944 chrome.exe 85 PID 3944 wrote to memory of 1116 3944 chrome.exe 86 PID 3944 wrote to memory of 1116 3944 chrome.exe 86 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87 PID 3944 wrote to memory of 1580 3944 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\d465172175d35d493fb1633e237700022bd849fa123164790b168b8318acb090.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ffea180cc40,0x7ffea180cc4c,0x7ffea180cc582⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1656,i,10579568764082482115,9821323293407354661,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1644 /prefetch:22⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2132,i,10579568764082482115,9821323293407354661,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2172 /prefetch:32⤵PID:1116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,10579568764082482115,9821323293407354661,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2416 /prefetch:82⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,10579568764082482115,9821323293407354661,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,10579568764082482115,9821323293407354661,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:1404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4576,i,10579568764082482115,9821323293407354661,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3112 /prefetch:82⤵PID:3276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=960,i,10579568764082482115,9821323293407354661,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4728 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:876
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5fe189f25ce1d74b169bfdf29d50e9f60
SHA10959ac7edb38c2e711d700dc23ae6486910d4086
SHA25688cdd19aa18abc10b5e0de95290d4084535d76525b62b16f9e711a3f47f22117
SHA5126a088bc9594a08838c9625b9294528b43dc440db425ff8c4159d7143068faa20ebf94712cd180b8754d9d124bfee9820255f2717f6e644ea186ec7e5306436d5
-
Filesize
1KB
MD56fe948a4bbde76844b4248c9166f44d8
SHA1b00abe8ab1a641c08f5df11367dda2e0e6043833
SHA25692d1858a4568157a14ef50a5d91cd6bf107d11b7b2edcc9ed5b29aa3467bf362
SHA512fe4d3733a28f695c19fecdae95d15215593a2267e346fc6a546e214ef8325b62b61c284346924ba8e6cd7a9aebb79ff4a838cba1b7f1c8533956b51fa7be215d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5d7078affeb0637fbd0c75c02d9806cfd
SHA12419e7e242e8b52a0772f9d1b2da23c8cdedeb78
SHA256da93fee584a7c433d71151456d00376de55ca01386a69edcf645446d72809ba7
SHA512e28b7719a5b1b6b794073bdb4a8b82b59508de96f15ddd4281abbb720474a2d876d6619090a2580a311ce84c918535726869d4bfb85ae6f0be14ad6fc1a08743
-
Filesize
9KB
MD5a9b7863d05cb161326a78f8d4482c16c
SHA19ad44323bb3a825752314030dc3e8a2a80a0a8f1
SHA256b33fa62e0707fb031b2c75412e268d91fc68e0be28773a3faee19d08344d3dd0
SHA512a7a0edd56f71139282ef197136d281154d9804cfad8e3761eaf72cf5dd5a3b6e15d2abc4c11ed23ac2945650505b43ab8fa190a3a8f2fb5a75ebff7337206889
-
Filesize
8KB
MD5e2cdb74d7944995dbb9d337f755e9524
SHA19513aeddeedbc7c4f9b133582572a2a5a39c47bf
SHA2568d73a224db3eaa4d6b9b59ec94e4f1dfc335169bebc7a8261b351f0d07d408d7
SHA512fd620544ead92e7de3c8cd68e8f9600580b9a55db1df9d3e4ab0cf05b7dd6d46af84473488033d5ac76e3d4cd50bc83c85d26a04b8e500ae8e0a584aa6d7245a
-
Filesize
9KB
MD5b8f3e9060a5a134e0542a47208708cd4
SHA1d6e445632c33e1b6574f3f4fed3fb90519a7882c
SHA25671c48d2bef85992029bf204016962cf82c30e114c2374f0c119f274b50b25623
SHA51281c33e49274ca60038f1f5923d82d2f65ebd713c49d7b1221a9169caebed544e057bfb67b6ee7fb71ff780c8ecf32b509ab432a388f1312bdb9e1627db92aad2
-
Filesize
9KB
MD5c3e83e1585086dab337df03039982ee5
SHA167722ef4128dc6270542adf5376d3163bc27a0fa
SHA25690d6cebc98dea1b9a92b149db2a635549517633ba320c3a4f53afb143c30a51b
SHA5123357d6a39801bd8780a517a497f76a3ae735216b830b9493a0439447e2b58ce92a4607d358ea05354630eb33a0cf384b8977e9c7ae62cea75fce58f7954e50e3
-
Filesize
9KB
MD5037e2ae24f9e5dda934f97afa3eca8bc
SHA16eae68503685358e98b7fab99350386592070ec1
SHA256dc6d9aea78c2f93dd625e76f4dbec5d4d9711dbb4628c090ee8f69ba643365db
SHA51244753031abd96bcaa67ce1e1846efe396c7211d702b1758c1243be6b8c84cf0a4b51c112f04bdac8557126651917bbcdc63ee6c72d43e28785da1c3001806f67
-
Filesize
9KB
MD5d3d83b0dab284cb7d8d73ba88081c81c
SHA1a4c79186729066eb5b81e860359259b1e9693eeb
SHA25637dba24095dd150644a9c351a7da52ca624b3a407b2a77320b3f0008998a239c
SHA512a4cc4d4070e5954c927efc4f91103b4c6458295d45439408fa6056d98543207676097542a0bd78a505aa0976c8be2d431d3943f8c153072ee5eda20107fb19ae
-
Filesize
99KB
MD5c0ff3818b15a606a6c5110dc73cd9520
SHA17ca2cc276ed3155289724c78c8ca5f8bedb9b74a
SHA2561d277093bcaa38f4681cda18941426e524b6b51fb572d31adc7eb2677b4e40fb
SHA51239f3a05a18e9d0fddf2214bc2f6c7e0b9e922e43312e7bf188cf6a5e6b9e40ba21cc2198321e0976b37c722b8c061fbe327d5495ce0e117875e26c4be2f175db
-
Filesize
99KB
MD56eb89a34d01fd79fcea5dcc2005adea6
SHA196075dc336aad0a1c175d29d02ef58971d937772
SHA2567e0d56834d7d22a9d756ecaac4288373c448deaef549ec9d1c5e9d6e6a534bda
SHA5120ab9724b3b8b5f78531efbcb05f90cecfaf0bbc2ea664218cd49407d48ea5527a1cb2f9cb8fd2cfd06d8ec85c5ba431481656cbfc6980f477f493bd06357803d