Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 21:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bhbajeh.naughtydatng.com/s/63f3794578d10?ext_click_id=aWQ7MWM1MWUwMmZkYQ==
Resource
win10v2004-20240802-en
General
-
Target
https://bhbajeh.naughtydatng.com/s/63f3794578d10?ext_click_id=aWQ7MWM1MWUwMmZkYQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133705641112139176" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2680 chrome.exe 2680 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2680 chrome.exe 2680 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2872 2680 chrome.exe 83 PID 2680 wrote to memory of 2872 2680 chrome.exe 83 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 60 2680 chrome.exe 84 PID 2680 wrote to memory of 4068 2680 chrome.exe 85 PID 2680 wrote to memory of 4068 2680 chrome.exe 85 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86 PID 2680 wrote to memory of 3676 2680 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bhbajeh.naughtydatng.com/s/63f3794578d10?ext_click_id=aWQ7MWM1MWUwMmZkYQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff51c7cc40,0x7fff51c7cc4c,0x7fff51c7cc582⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1972,i,15053769600656646654,11054052520613152904,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1968 /prefetch:22⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1884,i,15053769600656646654,11054052520613152904,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2084 /prefetch:32⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,15053769600656646654,11054052520613152904,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2440 /prefetch:82⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,15053769600656646654,11054052520613152904,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,15053769600656646654,11054052520613152904,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4488,i,15053769600656646654,11054052520613152904,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4620 /prefetch:82⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4760,i,15053769600656646654,11054052520613152904,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4624 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD540a908e12c5d6d56cd89042426dfa3c4
SHA150360d809e3332fc876d14fe032966d1158112d1
SHA25684c0492098be96cabb28d344490325c99c7a83e6b98b4777c5c803c0f9235663
SHA512f810d81d90ff7bbbaf0bea21aa8ac54c19b7734351c04d21d5136af2735229205d7f834d1896d94cc586fc930e75ad566e480772b3b550f3c508df7c15690913
-
Filesize
120B
MD586e5c0a9da662b318865e456b9d80f91
SHA131bcafdd24de59e815180bdd67ee3f6ae282044e
SHA256633f65d6067338aeda26fe25cd4f5f9377212405171366f6fb3d48c1c7178762
SHA512aa67cd6f2dcf9086afd2481f2af250215d971b02165a4c16794fd967e19725614b6cd7365817ac8431967f462c24de1961cc436f192bde1607b4a9c833ba3da6
-
Filesize
1KB
MD5a0930814862b840d2902c3e7228b471c
SHA13f5e7ce546f3dfb536e216299fe7e612e7afd7ee
SHA25688646a8604d9cf7a4f830a76aed5497953a63fa7f8fe78a928eedde8ff6a5901
SHA51230066e4a018a9cd32e278398bf0c1397bcba3a3b09afc146cdcfc0546c2335c6af990b90a30fa4febe78cfba4f5390e906b0371d373798e93999979eaa845dae
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5b4cf5e0c79aeb6bcc25eff8c4fdf80f9
SHA1935ceba247c3339a55a6eea602150791e3b33b14
SHA256f15bd8fb30666c791630357491fab24b89bce6762a850338ecd933682f238f10
SHA5128474618b4b6e7fac5c8a980429298a21fd204ea38fd7124f3e08c13a2e66e8154cf71db9f7fcc6759c6b2ac63d5831cf3d7cc028cdbddcfcfe9fb5b873fb5924
-
Filesize
9KB
MD5e3bc453412d2157ccad923983f643d78
SHA191906baeb6f155e7c9db27d8057d64a397876593
SHA256beef95f969b959d58d49c2db5df6570dd8b5252016a0a8a82fc0a2a7232ead03
SHA512270913640b08c943d9cf696101a9e1b173905c9fc98960c41cf3bd743884e66c3db997c13b1b4093f081769d2b9dbafd89b40afef0a41bc723908281ed710325
-
Filesize
9KB
MD5b00f41c126b5d77649e6490f37c63db1
SHA15701cf6513945f357d9841494322723d55b08ebe
SHA256e40f4855c0a738be26ec37deae698b13efc13f15b517dd903b7add4fe6bf2619
SHA512b7d08e9dd98a2f54896aa04f6dfaaf01b52fa6e9c0cf785f5d76184b4d6a7bd38efce9635aae6e34ce9e9b0b2ff02871597322f981015fc4f037add3f49dc6a8
-
Filesize
9KB
MD5d0e6eade002e7709f001b011f7456508
SHA14dd57386e7c82f073d59c7ef18c76a49e1475717
SHA2566a412ec770db15bafd2f354d767384163a7dc09c0778c5a248f60069f6ae479d
SHA512765e12eaff35ca26655a6526f42f6c7ce162fbabeef194ad880cd0918a06390ed21e508f157823c3459a0a9991874b9370693d20b4ef219e4b9805d0d4d66150
-
Filesize
9KB
MD524ed72b51f90f0114a9dffa2077c5ce2
SHA10256db3ef1a53dd0ec4074333109f68aad374f4b
SHA256fb14078e31393a1f9110e78f5229730c8be217d9e67cdb648dfcc7bf0a9e6035
SHA5121d61751e7a3951c715d0ebf4a5189a2e4c2c5dbef88d6314c3a777fbc6aecc17c6f3bf2cdcee693b55030652a2f49513173292a3bfdf296f57cdd1581dca43e9
-
Filesize
9KB
MD55c5e0846a65aef662aab0f2be94ca74b
SHA1f9de48292b3955bb3161152e4c5a262a51cac492
SHA256df02025108580e83ee63471defa17b8c690d8e32f49fb3271aa67bd90db69cc8
SHA512d6cd3a4dfe8efb3fc8569e9b07289ede6efa46d4cd66441331b16860705e483e0836e336bd6f4740d6c09a3177ced12392acf3f19df5f1db5c2a9be3882b1994
-
Filesize
9KB
MD58880291f1fa545315c2b7cd3b6dcc702
SHA1496f49668fec83df2ad5a83e11f2903bb5a663e6
SHA2563b9ab91d91a4e0bb9a97ce10c8a5df95db92449e4aa0f5efd846dd2e3379103d
SHA51289169c59b240ac393a5d55dd5ccbe6211369b3fd5cfe29203868ffcca1c1b41d0b7cb0763ae5dff32d4a11763c21015242c48e9f13b72aeeb0aad1f3058d5458
-
Filesize
9KB
MD5df44d701a94d034c15be18fb42ad59cb
SHA1af53d8e4ac6727d47c8fae7738729d069ddff77a
SHA25603f79e978f1bb01bec39353867b9357c2b9861689cb9e9ba62dd614b8eaa7c2b
SHA512ad43e63c9585007d4a1f46074fe6ce9153c5c1524927f0225fc6370d2b8266eacb6d20327b327469d03e718c608938a71d18c782eeb9c25fbe0cfa5eaaf62d50
-
Filesize
99KB
MD5eed4efcead0e9731878dc3ebf856bb7a
SHA1705f60fc2ca6203a05883048309d0f55210402d0
SHA2566c1b8883a2288be78094bfa46efa82b028bb96b598705b25500bf8e140d63d3a
SHA512555b1f0bdeb3f9198b62fc47571e0e1379a1d580d1cc8938a16dc658e9c28b7928bf113ed60bcc2c7d1963a4a478071d07e99b80fa490400acbafda475e6d740
-
Filesize
99KB
MD51317a7261bf025f0e28a022754662a38
SHA19e55cdfdfb8e6958b42dbdc2ae5a93b25864aa76
SHA256e334e90305140f940365423c8cfba65f85d71cc0d6fc3e7971ae1c4ffdc4e42b
SHA512ea51c3cc4f3b5faf7b6b458965d81f4c00119adb1a804e80f423baaa6a58c927041a2886af9ac5c03ea3432e857bd5598952964afcf7b79a498d9e89496349b7