Analysis
-
max time kernel
119s -
max time network
110s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/09/2024, 14:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://erudiricav.com
Resource
win11-20240802-en
General
-
Target
http://erudiricav.com
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133697600422004826" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe Token: SeShutdownPrivilege 4808 chrome.exe Token: SeCreatePagefilePrivilege 4808 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe 4808 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4808 wrote to memory of 3188 4808 chrome.exe 80 PID 4808 wrote to memory of 3188 4808 chrome.exe 80 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4408 4808 chrome.exe 81 PID 4808 wrote to memory of 4892 4808 chrome.exe 82 PID 4808 wrote to memory of 4892 4808 chrome.exe 82 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83 PID 4808 wrote to memory of 4480 4808 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://erudiricav.com1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe95bcc40,0x7ffbe95bcc4c,0x7ffbe95bcc582⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2012,i,10739278203258597334,6226079084885652725,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2008 /prefetch:22⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1784,i,10739278203258597334,6226079084885652725,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1812 /prefetch:32⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2176,i,10739278203258597334,6226079084885652725,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2192 /prefetch:82⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2968,i,10739278203258597334,6226079084885652725,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:1576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2972,i,10739278203258597334,6226079084885652725,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4372,i,10739278203258597334,6226079084885652725,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4368 /prefetch:12⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4564,i,10739278203258597334,6226079084885652725,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4540 /prefetch:82⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=212,i,10739278203258597334,6226079084885652725,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4876 /prefetch:82⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3656,i,10739278203258597334,6226079084885652725,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4596 /prefetch:82⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1968
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5a399c588c8b2b895545968b56f01b63a
SHA15f4b70b61e32e930ab8204d939c849c627c44a83
SHA256b03195f3fb1c65fca50ac9a2643fcf6724a6b6215532d039e82d98cfec7a0fdb
SHA512a2d68f218d34a7d81488ed3d666db33fb1c3119df0a3f87fb56692c7dfb848a91ebffc7b47adc5294564426a32dce684f5bc16ba38f01baf07201db5524e34fe
-
Filesize
288B
MD5b67fd60e5a431a92975c411b7f057c15
SHA11c1ef1c5db2664c42f18c4e3618ccfa5dfe124ca
SHA256f1e62936b3559352e2b535b5776e59f4f09bd72430e70263cb337ef7fa18efd7
SHA5121f95f59f5bde025b38e4a6d867b32c617d7a42469a4e1d00bb0d52aca26a91f2db6abb665bae5e6b2f8536e294917d7ee62e7679eed537c81dfa4a464e21cfff
-
Filesize
1KB
MD5714fd14ae3efa0df4d8215a7a0f65634
SHA1ce2ef4676e85d60852f2edb9500cb948b34f7e3a
SHA25641ececa6ebe6b284a82905b879816ee7c17d4b3a789227dadb500ff3a6415ffd
SHA512f95b179d3b538509f3d44f7a2b2d22af80169b7e11bed6b5ccde784bca9a6da3589c5b97ceb9a66ca793dc73a526d04e81719c60453e0a31c616abdf03c63dcb
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5169a6d8b1a60258c298aae40a5742146
SHA10d98913cdde5c6fc5d31d648c5f39d83768ba523
SHA25626b2eee3e74846c05e800f8836d385e4e9e7d68d33b30f7489843524b143ff1e
SHA5128fdc058fb163151f95c390a83ef6dc2cbf51dd52b390a0173f553ce8055cd7f0c7920c7af5430dbf54199a495820b87a99509e636ed0b2c6becd9e9b1031faea
-
Filesize
9KB
MD5a36a63d59b374fd35e08fcdde973cbac
SHA1cc15a435253789a57146a446c249ddefe545e58a
SHA2565602af09e37a06d51e4a3ca122af56e8914e54cb8acdcf4c0d653f7f5a4bcf51
SHA512538f34e2dc7bfecb7010fc58118ca116491e5b70ace60c2eeb4f4eb981b99611dd81c39e0ad2ed59147158fdf0f0fa4918dce2466d9a1d7c981cac16274c4a50
-
Filesize
9KB
MD52148d50856d369e98617c8ee7694ad5a
SHA18165dc35b20f954178f54f471243bdcc6d823439
SHA256b13b72c94c96195a68de9635b810d547d70f361f570fe361a75ad71e123e7bbd
SHA512f94a7893dc4a7be12e29a87a35919cc6d73cb3978b360b2c205b3a78a2e1d56363656d20508683d13edd6bfe2a54787f6708cabab1a1a724d48f93ca913b3365
-
Filesize
9KB
MD54ee322efb569cae92f606303431ea0a4
SHA1a8a855671c8245f81910732b9a84aa1b532ccb94
SHA256449fbc2a60f42a7235e2a09a852e85729218a596fdb955b9089c16b94d610a75
SHA51249cfa30df6994db2a0cad998e8c2d5f28cc33b587b7afe75d0ea50c6b06f423214a69c15063a523f48f83b2a3be64614b55bf50767f90bf2047cd77a8233e808
-
Filesize
9KB
MD532f73c3750a0759a013f519533d2206c
SHA19eea9b56567c0e50faf367c641ac589de6f5edad
SHA2566567a2b437d2cd51ca619fe9c843e7cd521abce27ea394b9fcf71ef6de08b2c9
SHA5127fabac5465bd3d08b05753552cea64bcae127ed5afd0165c8e6a551abbfad6347a64cffcbf7f9eb795622137a0b83671d0f4fb4ea7cc1d7b18d076fa2185eb54
-
Filesize
101KB
MD541be5bb1f9674368c07d9e2a8ce99ea6
SHA1459989241f8b1f6410a662765f9bf84881e48be8
SHA2561f60a424843bc425bb373144b0e9442612e0e76fbea0fada12a310b47ad91894
SHA5121e1ce008f79fceb4c5a8a7b2d8e52b06597f6ca4080d5a9d03a7e0c1742140a00832f4406500df6a4d71002ba316b1c6fc0795fb1ba52b6b3e05c0624d26d609
-
Filesize
101KB
MD55e406632ff0cb0832b612089fec6d174
SHA18349e970d46d56caf84a3fe3172b9e0851c8e094
SHA25633915308bdc8f019044bce10958d1aded4162626b2ae6c3d96c48426e05ed56e
SHA512ac5018bfeac153977d830036a63abe5dd3c001c56cb086ba5a86d2d6adf919df53ad62554f1dc7feaff6a35282c354af7ffb16443efbe9040210c14d3c1008d4
-
Filesize
138KB
MD5b33eaf26bb1eccad4b7f692c56d651e8
SHA1cc3760161ff591bd0e9edc584ecdc2a54a577e56
SHA256403393c4665bfba2da3dcaa79cd4cabec6ca2617c8b4be29b170c475ec2efade
SHA51283a40869490a6b51b808a79ed9de6ad413392273e135b1fb7e55ebe3a92e6a3cf68d5e6e470c622926bc3896568b1461d4c4602fc6fd06cfa937d4af701d244f
-
Filesize
101KB
MD554831f60cf6574d3da84799c8bb4291b
SHA1b6cc4422ee484079db219bec8d746ec12ee9101a
SHA2566729c533f4d27ab73547216c48c80e3d8a746531d8c0a41c67eaec0461efdc8a
SHA512a545e8bf9a6dfd6c5f0b38a4f568386d090f57eb3ee774cc1998a8e7e3af9d488f608075168243edb468dcf0844d37d470f1aa8b29bef5ec04e10d6827437c43
-
Filesize
101KB
MD52edc6078a01133669da2a4bf9e75e86a
SHA1d3d6d623f4a8e342336435cc10932cd6a42be3b5
SHA2561eb450b757d3bb563ad5f4871007a39225a123f14eb4700671866ce1ea17be72
SHA512e0bdaca408273f0558305f5e7595d2763d689f5ad97176c3fb9062dd7dd4af5b56dd9d499aea07eb792051d88224a8b9903db24b7523c7cfb35df8a87f656e24