Analysis
-
max time kernel
559s -
max time network
1794s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 15:08
Static task
static1
Behavioral task
behavioral1
Sample
Screenshot 2024-10-28 215233.png
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Screenshot 2024-10-28 215233.png
Resource
win10v2004-20241007-en
General
-
Target
Screenshot 2024-10-28 215233.png
-
Size
25KB
-
MD5
7b307a95029dd50f97b58ee08553217e
-
SHA1
236ba3bf7da821fb44920eaa321a5428cba2e139
-
SHA256
ce67d881f76f6a21f64c79a109422a0a9322f490fdc7eaaf72142ae2bbedaa71
-
SHA512
40155ca2657ab586b056083705a93614deda716456c16a51efad13eecd57f54e41d858289805ba34ddffe45ca2140925451cec990a7ae1ceb800d290193209d6
-
SSDEEP
768:lhKjmw5wQw7RfWNKybNJGooXbL/3u+c74kvrF:ljwEaNJz8bCfHrF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe Token: SeShutdownPrivilege 2992 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe 2992 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2632 2992 chrome.exe 32 PID 2992 wrote to memory of 2632 2992 chrome.exe 32 PID 2992 wrote to memory of 2632 2992 chrome.exe 32 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 600 2992 chrome.exe 34 PID 2992 wrote to memory of 2420 2992 chrome.exe 35 PID 2992 wrote to memory of 2420 2992 chrome.exe 35 PID 2992 wrote to memory of 2420 2992 chrome.exe 35 PID 2992 wrote to memory of 2144 2992 chrome.exe 36 PID 2992 wrote to memory of 2144 2992 chrome.exe 36 PID 2992 wrote to memory of 2144 2992 chrome.exe 36 PID 2992 wrote to memory of 2144 2992 chrome.exe 36 PID 2992 wrote to memory of 2144 2992 chrome.exe 36 PID 2992 wrote to memory of 2144 2992 chrome.exe 36 PID 2992 wrote to memory of 2144 2992 chrome.exe 36 PID 2992 wrote to memory of 2144 2992 chrome.exe 36 PID 2992 wrote to memory of 2144 2992 chrome.exe 36 PID 2992 wrote to memory of 2144 2992 chrome.exe 36 PID 2992 wrote to memory of 2144 2992 chrome.exe 36 PID 2992 wrote to memory of 2144 2992 chrome.exe 36 PID 2992 wrote to memory of 2144 2992 chrome.exe 36 PID 2992 wrote to memory of 2144 2992 chrome.exe 36 PID 2992 wrote to memory of 2144 2992 chrome.exe 36 PID 2992 wrote to memory of 2144 2992 chrome.exe 36 PID 2992 wrote to memory of 2144 2992 chrome.exe 36 PID 2992 wrote to memory of 2144 2992 chrome.exe 36 PID 2992 wrote to memory of 2144 2992 chrome.exe 36
Processes
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen "C:\Users\Admin\AppData\Local\Temp\Screenshot 2024-10-28 215233.png"1⤵PID:2372
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef79c9758,0x7fef79c9768,0x7fef79c97782⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1308,i,14071733013713273824,11762167156748591590,131072 /prefetch:22⤵PID:600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1028 --field-trial-handle=1308,i,14071733013713273824,11762167156748591590,131072 /prefetch:82⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1308,i,14071733013713273824,11762167156748591590,131072 /prefetch:82⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2264 --field-trial-handle=1308,i,14071733013713273824,11762167156748591590,131072 /prefetch:12⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2272 --field-trial-handle=1308,i,14071733013713273824,11762167156748591590,131072 /prefetch:12⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1320 --field-trial-handle=1308,i,14071733013713273824,11762167156748591590,131072 /prefetch:22⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1460 --field-trial-handle=1308,i,14071733013713273824,11762167156748591590,131072 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3424 --field-trial-handle=1308,i,14071733013713273824,11762167156748591590,131072 /prefetch:82⤵PID:972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3448 --field-trial-handle=1308,i,14071733013713273824,11762167156748591590,131072 /prefetch:82⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3440 --field-trial-handle=1308,i,14071733013713273824,11762167156748591590,131072 /prefetch:82⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3416 --field-trial-handle=1308,i,14071733013713273824,11762167156748591590,131072 /prefetch:82⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3976 --field-trial-handle=1308,i,14071733013713273824,11762167156748591590,131072 /prefetch:82⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3856 --field-trial-handle=1308,i,14071733013713273824,11762167156748591590,131072 /prefetch:82⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3948 --field-trial-handle=1308,i,14071733013713273824,11762167156748591590,131072 /prefetch:82⤵PID:1220
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
355KB
MD5883c739632dbdd0b7f30d60d23c3ca0e
SHA1a9b93d14c6ef1fa8ec239844957bdd3d218b867e
SHA256b67c076cd5237e60150f597b5a5f72e31bb01d075da236162c46eeea8d5bcf3e
SHA51224b89ee49d2fd1089d338ae129b1eb792608dea409289ab1261af3c2b5e6032342d5925eab222b98508b505137c315cf45ad9a72616472b7dd02f4321686a049
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5bf0e3292e4be2f5ed122aa2be74531a0
SHA1da7e3d7691a3acd8bee984e9361f118dba7866c6
SHA256fda64bcaba3817536aac210a6f8fb5f6f8e1e4580b23522d0e7c3073b086fc2a
SHA512c5d596ff78000626c85c6bb0ac9fceaefd4bc49ecde8105a505c09b368617a17c3f73d5ec9f720815c8a673270596c2e5fb0026d51d17d38f9697095a0268a1c
-
Filesize
2KB
MD53c0b0a103b43e59800603bf860734b13
SHA1c92bbded3af9eb8ed4850559ca1075bf1b102715
SHA2567cdf8d484b841129f72f04b135d2da5f6375bf23d9b1d31b5ff2defcc578465e
SHA512169fad3e089468c6c648a66974b05cc5c9437ba4017c00c781e28cd9dbc747b7846f2b8d1992a5627cbb8f96526ae0560c500ddccee4928d37371404a49cbfe8
-
Filesize
5KB
MD540e813e7f57dca0f3274c7898cb9fa29
SHA12ed165325bcc16e66297b21f8744404cf026acd7
SHA256b3125b8cde6e8268d57db402a977ef1b51a1282c81aba2b75246ad74b395edd0
SHA51276fcd78def7a27e7a07a91ac7959144c7c9d4aad63c5d6339582b0696c3e6112dcd0d265d9bcd2e0e2502413a3b0a7280158097ce0fe0190e619881dd5c1d38f
-
Filesize
5KB
MD596de99146d27400f28ec4b256232b04a
SHA171362b643de5e565b22d8b17a31b013b3feb070e
SHA2565d6ac4b38d627307e34e406af049866edb731d9ad69a675bbc4dac307557f876
SHA5121306ec7383acd1808f3ebe860315c6c03c5f9f88862ec28286f3cbe68336048d64bb3f9109cf606e7cb204a0f80ec7484d7d51e03c77f2afcbbffeb71c36c403
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
177KB
MD5949031b5e5ef35fb6cf0ab4ef129456a
SHA1a9c7fbed19ef0aac596b649c75b8a12d7fb2e6da
SHA256563d9fd7a6ff6d7610f6bbbfe308974b675ff0aa8d59ddc3106408a234c5be83
SHA512c6913d65168ca61dac29f414b873c8203c1f42842ad2e59c588513cedbf5d5b1168c48f8b083fc232caa5f0dacc01a2ceaef2a95766c830a5ed7bd697fb611b8
-
Filesize
372KB
MD5756cf6ace8441301041090a39889f19d
SHA18f68fb1390423bc9ad1421b7bab3a21fa3809e37
SHA256d6d484c22df66c95f51c15cafd566d635a8029dbf45f79ec1d99951224ef8301
SHA5127b82ef04abcb373b209b405b4c690dd1d352d2d93b836ffdc3aadb8369cb8cc0ef94f3aaef4fdf4d8b0e83a5b1afcb567633e07a9db37f221cb831e77b942775