Resubmissions
24/08/2024, 22:59
240824-2yqeyswdnn 324/08/2024, 22:51
240824-2s5bxswbkn 324/08/2024, 22:48
240824-2q6rzawalk 324/08/2024, 22:44
240824-2n2egavhlj 324/08/2024, 22:43
240824-2na8aavgrn 324/08/2024, 22:41
240824-2mdl1stdmd 324/08/2024, 22:38
240824-2kq5bsvfqj 3Analysis
-
max time kernel
32s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 22:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://youareanidiot.cc
Resource
win10v2004-20240802-en
Errors
General
-
Target
http://youareanidiot.cc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "198" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 440 msedge.exe 440 msedge.exe 1756 msedge.exe 1756 msedge.exe 5024 identity_helper.exe 5024 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3836 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1756 wrote to memory of 1180 1756 msedge.exe 85 PID 1756 wrote to memory of 1180 1756 msedge.exe 85 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 4828 1756 msedge.exe 86 PID 1756 wrote to memory of 440 1756 msedge.exe 87 PID 1756 wrote to memory of 440 1756 msedge.exe 87 PID 1756 wrote to memory of 1424 1756 msedge.exe 88 PID 1756 wrote to memory of 1424 1756 msedge.exe 88 PID 1756 wrote to memory of 1424 1756 msedge.exe 88 PID 1756 wrote to memory of 1424 1756 msedge.exe 88 PID 1756 wrote to memory of 1424 1756 msedge.exe 88 PID 1756 wrote to memory of 1424 1756 msedge.exe 88 PID 1756 wrote to memory of 1424 1756 msedge.exe 88 PID 1756 wrote to memory of 1424 1756 msedge.exe 88 PID 1756 wrote to memory of 1424 1756 msedge.exe 88 PID 1756 wrote to memory of 1424 1756 msedge.exe 88 PID 1756 wrote to memory of 1424 1756 msedge.exe 88 PID 1756 wrote to memory of 1424 1756 msedge.exe 88 PID 1756 wrote to memory of 1424 1756 msedge.exe 88 PID 1756 wrote to memory of 1424 1756 msedge.exe 88 PID 1756 wrote to memory of 1424 1756 msedge.exe 88 PID 1756 wrote to memory of 1424 1756 msedge.exe 88 PID 1756 wrote to memory of 1424 1756 msedge.exe 88 PID 1756 wrote to memory of 1424 1756 msedge.exe 88 PID 1756 wrote to memory of 1424 1756 msedge.exe 88 PID 1756 wrote to memory of 1424 1756 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://youareanidiot.cc1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffac07e46f8,0x7ffac07e4708,0x7ffac07e47182⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,6632704311068931502,11739022608023835610,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,6632704311068931502,11739022608023835610,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,6632704311068931502,11739022608023835610,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6632704311068931502,11739022608023835610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6632704311068931502,11739022608023835610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6632704311068931502,11739022608023835610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,6632704311068931502,11739022608023835610,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,6632704311068931502,11739022608023835610,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6632704311068931502,11739022608023835610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6632704311068931502,11739022608023835610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6632704311068931502,11739022608023835610,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6632704311068931502,11739022608023835610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6632704311068931502,11739022608023835610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6632704311068931502,11739022608023835610,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6632704311068931502,11739022608023835610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:4396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3008
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3974855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
5KB
MD5a53043c2a68e48e2b5d770c7e4d6ee53
SHA17ab429e35f4d0f340835e9996aea1414a0efe75b
SHA256d06b3db6c82f6e1eb08ea33077c5ae6ab4e4aad4bedbe3179693049a82001999
SHA512e0203501f3bb69a68690b050ed1f1d73d9a7b2e9a91d9b77a31ecde05d1218ab80e13e13ab597da395c5172a4c0e50275360f559391ff66f43881ffc176df73f
-
Filesize
6KB
MD509d7b932c26293f4665ccf9658dc9acb
SHA13864d13d088261720a9cf90b955a0b1016e5c132
SHA2561a4b5f8be6ac50c9af3cd8c7541a3d9f63e64abfe3d9ad32e06b63ed306260ef
SHA512847341a9665d7e3406b165704d37ca01269d0047913ed4b9fea8f1a03e7d9569f3e3184c3af91bdff61203a6268937b326a4d7ee5438cb9932ffcb6b199c32b9
-
Filesize
6KB
MD5c507182476ec0a94d3da22f7084c6fc6
SHA18282ed19b2c67dd8ffd0e6dcb7db5df017f2d34d
SHA256cb5f77da307ca320b172eaf4c235283c54e68624a9b3b71f9ad7e5c9dd01cb90
SHA512ba4d751559311b337a4112049d6a4ae84e1f98fc19df10cdf45163fc40e87274cc9f86ab169cf7575b25f3d2b023859b66ebde0b386fc91b6225496f857266e1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ad080470efff371fb0c5db4a4cb33253
SHA1e76d8492fe19f619ad600557547a2bb6d2142cbd
SHA256b6d3c700a46bccdcf8a242143c9212f32de48aa49fb90646678a96992032e81c
SHA512345f5f06492ee58a96b35cf1db37d4b0a7f4c52ee3516a9ea8a8a64022cb33fe439c10a8343bd2f0a7b1c40ab2256dd3e5391f9d4670e2e180265ae64a0a916c
-
Filesize
11KB
MD535a727970c370a6c0fcdae241c79dd54
SHA1cc0694f8cf5d78a60be77a7b62e3291f500a5fe5
SHA256090f22f60961f2ce4d8d58cd8a070ecc41d4de7e5cc68ab888a47f9b02119379
SHA5121d55281df351e3353be5c997c295340ccf1cbf8e2ad61f6e9903bd5606891e0eea7d6e6a318211894fd49fa049665a624fcf79f59bc28d8dc25ed3d895b5385c