Resubmissions
21-08-2024 15:43
240821-s6b3vszgrl 1021-08-2024 15:40
240821-s36s3azfpp 1021-08-2024 15:31
240821-sx7heazdlm 10Analysis
-
max time kernel
135s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 15:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/17HK-EZtmp9Jo3L4tgadFEfmAP_LNQyR5/view
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
https://drive.google.com/file/d/17HK-EZtmp9Jo3L4tgadFEfmAP_LNQyR5/view
Resource
win7-20240704-en
Behavioral task
behavioral3
Sample
https://drive.google.com/file/d/17HK-EZtmp9Jo3L4tgadFEfmAP_LNQyR5/view
Resource
win10-20240611-en
Behavioral task
behavioral4
Sample
https://drive.google.com/file/d/17HK-EZtmp9Jo3L4tgadFEfmAP_LNQyR5/view
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
https://drive.google.com/file/d/17HK-EZtmp9Jo3L4tgadFEfmAP_LNQyR5/view
Resource
win11-20240802-en
General
-
Target
https://drive.google.com/file/d/17HK-EZtmp9Jo3L4tgadFEfmAP_LNQyR5/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 137 drive.google.com 4 drive.google.com 52 drive.google.com 74 drive.google.com 8 drive.google.com 44 drive.google.com 45 drive.google.com 51 drive.google.com 3 drive.google.com 5 drive.google.com 7 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133687279549161883" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2564 msedge.exe 2564 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3640 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3640 7zFM.exe Token: 35 3640 7zFM.exe Token: SeSecurityPrivilege 3640 7zFM.exe Token: SeSecurityPrivilege 3640 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3640 7zFM.exe 3640 7zFM.exe 3640 7zFM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2564 wrote to memory of 452 2564 msedge.exe 121 PID 2564 wrote to memory of 452 2564 msedge.exe 121 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 2172 2564 msedge.exe 123 PID 2564 wrote to memory of 4412 2564 msedge.exe 124 PID 2564 wrote to memory of 4412 2564 msedge.exe 124 PID 2564 wrote to memory of 5008 2564 msedge.exe 125 PID 2564 wrote to memory of 5008 2564 msedge.exe 125 PID 2564 wrote to memory of 5008 2564 msedge.exe 125 PID 2564 wrote to memory of 5008 2564 msedge.exe 125 PID 2564 wrote to memory of 5008 2564 msedge.exe 125 PID 2564 wrote to memory of 5008 2564 msedge.exe 125 PID 2564 wrote to memory of 5008 2564 msedge.exe 125 PID 2564 wrote to memory of 5008 2564 msedge.exe 125 PID 2564 wrote to memory of 5008 2564 msedge.exe 125
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/17HK-EZtmp9Jo3L4tgadFEfmAP_LNQyR5/view1⤵PID:2844
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=3828,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=5012 /prefetch:11⤵PID:4736
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --field-trial-handle=3844,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=4524 /prefetch:11⤵PID:3648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=5172,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=5352 /prefetch:81⤵PID:4164
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --field-trial-handle=5356,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=5412 /prefetch:81⤵PID:1912
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --renderer-sub-type=extension --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --field-trial-handle=5864,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=5840 /prefetch:21⤵PID:3080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --field-trial-handle=6044,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=6068 /prefetch:11⤵PID:4808
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=6288,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=6296 /prefetch:81⤵PID:1628
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --field-trial-handle=5840,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=5844 /prefetch:11⤵PID:4372
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --field-trial-handle=5920,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=6532 /prefetch:11⤵PID:4648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --field-trial-handle=6016,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=6580 /prefetch:81⤵PID:2436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --field-trial-handle=5952,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=6584 /prefetch:11⤵PID:2584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --lang=en-US --service-sandbox-type=service --field-trial-handle=6300,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=7036 /prefetch:81⤵PID:1044
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --field-trial-handle=6872,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=6920 /prefetch:81⤵PID:4464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --field-trial-handle=7056,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=7108 /prefetch:81⤵PID:1192
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2300
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\123123 пароль.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3640
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.86 --initial-client-data=0x238,0x23c,0x240,0x234,0x25c,0x7ff882ced198,0x7ff882ced1a4,0x7ff882ced1b02⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2840,i,1430300677159244128,13279364341125783071,262144 --variations-seed-version --mojo-platform-channel-handle=2836 /prefetch:22⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=1980,i,1430300677159244128,13279364341125783071,262144 --variations-seed-version --mojo-platform-channel-handle=3084 /prefetch:32⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --field-trial-handle=2284,i,1430300677159244128,13279364341125783071,262144 --variations-seed-version --mojo-platform-channel-handle=3488 /prefetch:82⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4704,i,1430300677159244128,13279364341125783071,262144 --variations-seed-version --mojo-platform-channel-handle=4724 /prefetch:82⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4712,i,1430300677159244128,13279364341125783071,262144 --variations-seed-version --mojo-platform-channel-handle=4728 /prefetch:82⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=2800,i,1430300677159244128,13279364341125783071,262144 --variations-seed-version --mojo-platform-channel-handle=4732 /prefetch:82⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\elevation_service.exe"1⤵PID:4508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
6KB
MD5eb5ad1d7801accf63f3f94c21245af46
SHA1e7a7a059affe9a9285113f94bb8f12ba7c42f7b7
SHA256aa17c100f4b09eafb6ee844f018656918e312868c747037ffb1ea18f5aa27a76
SHA512bb56d26e8afe3f2201b524fc645a4f9da4d772f368c2c09b88daae2bd8385af77621ab62be255ea023b3e72cbcb220872a3a00f0a5c292a24315829595131b53
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
11KB
MD5199be4af46d6711403256b118d6395db
SHA1bf3ca3d70ec8f8d725e6b9fa809e73db3ca365b9
SHA2563cc440afc0a2c168b2cc04ca2639317e16a5e18b57f85e99b6f49a10b42a062d
SHA5128bf0e1d7b3d463fb581e088be6a685bbb453d2d485427784b3dfa445705ca5bb9fb23d8d2688c0901f1abe448235446ea2f3460f0facc7a99e90f29292d04002
-
Filesize
30KB
MD5e4f68bbb3d66fe9ff192638b150c01fc
SHA1a8254d70a8657004df9708ee6e3d866725aa63c6
SHA25652c244348f08d98561456a5a0230c7c6d61084d4e4ccf8bc2c06a224ced83c6d
SHA51268bb70c383eb363f0ad152d8486c7d7fc6dc49fa21f44bfc8df58ff64fc2e06daf4e121d7fbc67615fe80d0b12e9ccc68f94e5204dd5777fdfd4fd699252c6b3
-
Filesize
67KB
MD5258b9103b9a1c66b038128544be8fdd4
SHA16461c3ff2da04e392226c798f52504961347c927
SHA256ca11b72f6481206f9c58ec8ce82214a882375b140811de26be8859d033d79c61
SHA5129251ca1aff57813837b60e7f03a8c397f17139f066ebce48bed88271f0a0967c65b9e9bd69bd5a9ed1745ab484a81d7c0e9824c259bf7ff24319018c4bf60d61