Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 00:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1_eZxJ9YyrokaLPe1nkjuZyXPEyzQ_Yu_/preview
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1_eZxJ9YyrokaLPe1nkjuZyXPEyzQ_Yu_/preview
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 drive.google.com 8 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133758453099951438" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 812 chrome.exe 812 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 812 chrome.exe 812 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe Token: SeShutdownPrivilege 812 chrome.exe Token: SeCreatePagefilePrivilege 812 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe 812 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 812 wrote to memory of 964 812 chrome.exe 83 PID 812 wrote to memory of 964 812 chrome.exe 83 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 5000 812 chrome.exe 84 PID 812 wrote to memory of 3636 812 chrome.exe 85 PID 812 wrote to memory of 3636 812 chrome.exe 85 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86 PID 812 wrote to memory of 1156 812 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1_eZxJ9YyrokaLPe1nkjuZyXPEyzQ_Yu_/preview1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe8148cc40,0x7ffe8148cc4c,0x7ffe8148cc582⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,13687948415224624869,16153131403664991377,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1880 /prefetch:22⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2168,i,13687948415224624869,16153131403664991377,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2172 /prefetch:32⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,13687948415224624869,16153131403664991377,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2212 /prefetch:82⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,13687948415224624869,16153131403664991377,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,13687948415224624869,16153131403664991377,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4628,i,13687948415224624869,16153131403664991377,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4656 /prefetch:82⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4684,i,13687948415224624869,16153131403664991377,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4680 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4304
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4604
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5fa4dcbc974d937cac1203add4e9f94cc
SHA1dc808de9f902a15cb9b1a6b114cb0539df4d6b2e
SHA256474ce18b713eda0fb2ea722d1fe6def8895385683d05513733df01ab47382394
SHA512f49998012b0ad18828a010913e6ed7a6c1ef4e544cacdf069cfee237e7a73146ce523e890b9a0d5d4fffe02bfd613f865bc491800a80779d75b1c997c8df0960
-
Filesize
288B
MD5b729fdcfd66a27726ece64133b7e5c95
SHA18f277a0cb607c62357cad69d18ba9b2622384ee6
SHA25686c1fbd2a6ebffad003782b24a7d084059054a43973d1985e6134cee654d1ad9
SHA51299294a3eb6133189a3ed845a4d3f089ddd0c9acb0fac7972d2a90ccd92f0b6adb6151bcec93d82850d4f86d7779012659e14ca9f5c897d456b39a5d5a03108d6
-
Filesize
4KB
MD5400305f7ac7b744c0e7eeca144183e96
SHA1056cd691949e9bb8ec14b23ad22f1db4bb0ec431
SHA256dd6594c39cd8839559441ca5162190547d4188dd4cec7e8d3cb95503d0b807c4
SHA5126dfd68db745191d71492500f4ce2d3814a1678d43b3cb86d850f4f277b8344e449558a24bf43b326c3b12563e437cd24148b3df445ee405652f3358c65781034
-
Filesize
4KB
MD5da2c736424a17d03825aa2d90283f05e
SHA113491ce72b775329044c402b932e8cae92daecea
SHA256bdbe6da356a42e78d451bed31167af1306c3b1f8e1d4fb460b45575e2c746095
SHA5124f6011429af64edd382f1371bd99cdb8ff5abb1a83bdad0be2c17032c0fab02b65c63f29decb280af624339ebcd723f52c2b4e755ff408b9a63f1a78de43062a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD5275d32b609a1630bf7b589c74210772a
SHA11d070f03efa2aa0188b6d9a5a11a471f072f3d52
SHA2565a61df1dbadef2c635bcc24957376ae6110c8ecbc4d60aabf2f37b7826994dbd
SHA51222cf0fb0920f7f7708380a63a56ca9d02a8c00413c659cd4f0ce847333ab984a0058c9ab5232d830d271dc8cdd8953ce1fa08fc565c410b5581cb985dc082e38
-
Filesize
9KB
MD52e012b9cabc87054bd74782aa9ee6637
SHA1aae63e92f5d54e311bf389d00c916a5c690e04dd
SHA256182b68bef11042fe3653807fe724fca79a3d7833706e09deddd592db03d8c36d
SHA51203c134435a1fff87332a63ab3e7a769a8ce802a94cfe8b404e4c26ef0c7d4d2405d1b99cdc91ea44bd74e942bdb3529da7f2d701d366164b2db27dd682d38ada
-
Filesize
9KB
MD5eb2dddc9345a2c99dd811ad3801a76ff
SHA1127ccb597339e9734b9fd6d22829183b3e4c7773
SHA256b668aa76384225eb99235143961b4a1afaf7c2344a44e5bc745a1bb1e58ebdb6
SHA51255e2b40f28e15f2efa644e0c4e3ee413b4307397832303677dbe8cef8efe0a11ab50f40d854a048f73bebdc1eeef22acda8bc59f3d4462c42724b1e7ab69873b
-
Filesize
9KB
MD53a09f4e7341058fe2d2bef48ce0f25c9
SHA1f71fe475cbe5dfda6ecd45d68ce0ee06b8c90fcd
SHA256a0adb086453891c5b93d6dc74c34a22a47acee62c49455e747e3a77dc730e14c
SHA512c0b31b3525489211bb41bd5d5342b2a359c7d0b29f734edd1170525b81ea5f3688f321ccfbbc9748016a75de7abc29b89360a740cc5b91f8081c161106b8e2e3
-
Filesize
9KB
MD5dc3c19266e77e2fb536f683db934a411
SHA16a1d03a32b1db2311e2acb3c871ea28aa08c0fbd
SHA2568ed593741dc85bdb3764da13c29285f79e00554e246381e4920da04e6ead3162
SHA512af4f4eb082805366a8cc0c0a6a3043a02040a63d7413685117ac8b16880c594da30493b7cc5a8fc2f698e40c16883f1ee29a6b230499c8e8b20390741358ae47
-
Filesize
9KB
MD56eefb8788927a22d9bed57ce29fc07d1
SHA1feb6baa2aa44907e21b8598505ba96db26db51c8
SHA256eb01bf535eb45987178ebd42460e22c6b8ac6ab6ffff04a29aa9c3eb41a2cc37
SHA5122af190c58131746dda73ae00a5247f3eac7e0d183cbdd701b665e93e3dd2e7ed21204af0d7310b28b65e2801a5482eda9f2d6034837d6db6477e58a5cc7134ce
-
Filesize
9KB
MD5b201f94c5e10136b8e3da6d44c02f5b8
SHA14c7381a136766ca2dd1c42f1154f8dba3640c6f6
SHA2565482264fe002362775bca1f75b254a58f5045a3ec8122d82e1b8fc86e8b8f342
SHA51207c061cef6a319d26c3f3b8e9c4acc676bfa815c37677517ef44ffe08aff442d2839ad73e09461b0974bb800ed2f4558d2d843caad8350bec4d77d6eb9dcb550
-
Filesize
9KB
MD51c783ce129d35edbf224f485453f5efb
SHA175f1579ee6fde126f0b688211ac5188b7737eb6f
SHA256b6fbe93a9080397331fdf7acd77e3aae4acaa90e0af09ba8538c46722d6d8d06
SHA5122a9d029a43783368496bf15f0e12f1a93fa172bd217d4dd535b1d54397097bfda369d689e6e33ec403c3790c20cda84b3e25b284c4182391fcc13e46b108b53c
-
Filesize
116KB
MD5cda90f83b9b6b45b6ccb027aba1ca69e
SHA1842b9c69cb2101e7b509921bbae2361151f19b5c
SHA256edb1f270018b35a1b3437f2ca1c4fb53d47b67798f9f96ac6691880eab5608f2
SHA5120fa3334068c90b6ea5affeebb141cd473c30934948391d7b56a1423ab3bb85918caac8ce37e83fe164456117f6b5faa6ff217fab258f7cf8755288439edec822
-
Filesize
116KB
MD58b9783e0c12f6ba8f8e81edf95270815
SHA1566d9e6eb3a163a8f650a0068ce5d01ded3bab92
SHA256cc2fa6485272b1296bde55fe800e7c262fd5e7070d62d131b359997cf03cf550
SHA512560f32da21dfca50f9cde6491825badabbad48a1a4bf010ad5ec28065db3396eb930524590e3776cd47fb4b2fb73c321422303d8ba81bf481d528d81883be7bc