Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 14:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://cannonworldservices.com
Resource
win10v2004-20241007-en
General
-
Target
http://cannonworldservices.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133765851305040857" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 572 chrome.exe 572 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe 2364 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 572 chrome.exe 572 chrome.exe 572 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe Token: SeShutdownPrivilege 572 chrome.exe Token: SeCreatePagefilePrivilege 572 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe 572 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 572 wrote to memory of 5056 572 chrome.exe 84 PID 572 wrote to memory of 5056 572 chrome.exe 84 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3660 572 chrome.exe 85 PID 572 wrote to memory of 3484 572 chrome.exe 86 PID 572 wrote to memory of 3484 572 chrome.exe 86 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87 PID 572 wrote to memory of 1864 572 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://cannonworldservices.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe7cadcc40,0x7ffe7cadcc4c,0x7ffe7cadcc582⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1816,i,7940442092830817708,2225343610692894801,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1812 /prefetch:22⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2016,i,7940442092830817708,2225343610692894801,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2144 /prefetch:32⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2220,i,7940442092830817708,2225343610692894801,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2556 /prefetch:82⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3040,i,7940442092830817708,2225343610692894801,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3068 /prefetch:12⤵PID:440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3060,i,7940442092830817708,2225343610692894801,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4424,i,7940442092830817708,2225343610692894801,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3680 /prefetch:12⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3028,i,7940442092830817708,2225343610692894801,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4412 /prefetch:82⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4412,i,7940442092830817708,2225343610692894801,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD54910efbd7520222236681077d6dd673b
SHA1222590375c5f412bf8bd8cea9a8b5b7e554d50b4
SHA256bdc7fd44d6dc821236a7dde0a7c704b8b294f9b504f8bceed178ea940ad7a5ce
SHA512d88d80037a3fe4f241c8e374f337daa39591db406f93bfb6519a33815f4df18abd7ea84441fd3d1ff1fcc433015abd0d440f9c55d8d956f9700b3a25ad1612b2
-
Filesize
1KB
MD50daa76065589ce5308b1d767b59fe3fe
SHA17be135f5ba1fd1945cc71714e6e77df28cc50306
SHA25621fafd7230388124270fff91df16d58e31712475c5474a15862eabcf6f922812
SHA5128910165b7e7ececbe5910df852a525a96f84224b44e34ef62a94ffd0e34a66549f60013a15cae69f496297ae331fe70df7fd32fdd09e48ae49f146db5dadf066
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD58a096d05124118e3b439b86e7e9f767d
SHA11f387a37fd3a0666cfc7c67c4028acc818ec1841
SHA25658fe1e8892738fcf501918214b0a2436df10a716dbf314fedcc9a0da6ffeb641
SHA5121333238ef36d99d0a2f3b3e285d9ca254fdaf55da90d106d8e840045e4ef9f554d4d049682232626833169ed98cfe701551d5579c41ced1fd7a7d1bdd9d52ec2
-
Filesize
9KB
MD556dd6fde731c8915aafa271a960188f8
SHA14233b71fa3a8bb7dda74fc368b69084f5ddeaf29
SHA256e616f141096e89602e11b86df493ed9bc93e69a14dfef12a26e92cdfd28f5f87
SHA5120fad638e941f7d8ccbf45d87c7e276801fd2a2023b01357d8da51c9b1b9b9d2faeedbe38e48f973ed6709319221570ec0e2881edc761707e8f04b0cd7c47cb50
-
Filesize
9KB
MD54ba859e364d2eeb1863f69432d088c4c
SHA100a8e9387a181121887e9c504181f2b2a7a7dd33
SHA2562b331ff0b07d8eb5e3658850b7a2cf47dde130e7f7e199a22879fedb138d2add
SHA512b0255ce665bd7a1488dfceef1bf1517590b86ca73b2de914d71f34c3b93bf67b46ae5edabeacc299da45f64065c0378b135368d8ba592572e418bb575dc9b8f5
-
Filesize
9KB
MD590b7370b62d75e1908d8b2e3448b8036
SHA1fa8db83c920a9b20da55272edfec0b2c2c1f35c1
SHA25652227edc0530da162cf953c6617c1dd83f8436ac7f3b7e8902ec830456b6ebf6
SHA512e086a75047c8322a78fe307eb4b81d84a37a1f1d756617d066c5b22845c64d393c7d236ad87196a4c3b8e4a14642cde182be8d6373ffd11e562f0aa50fcf4860
-
Filesize
9KB
MD5b489e2b5a25e2b38fada75c03fc6a2a1
SHA1b0f4ab54f35422908d5c33431df6c44811546a06
SHA256073596eb2336a29803cca640cf621673ea2239201427c0823b1e0c58ee5de141
SHA5122bb98352b26098ce6ec050df50cd45c491e6005e0dba0d2526b6ea572242535613a26c02085b47bada86e4a1badc9b3daf3710079e75ca3764c34d602a3fa204
-
Filesize
9KB
MD5370d7677d9571adc3c4b5cdca505cdf2
SHA1f9ebcb8e96f8670996d2791531fae920ef8886e8
SHA2565f4623a47c1034f24f6ca95e3d56fc669148ba0cce8bca7699ce9f2a5efddce6
SHA512d182c4dcf3ea4a08e082c410c59819701e684f8606ebf97c6966159cd54de87470964c6366ab8a237cc543d82b3ab1301c5bbe59305276d4dacab3f7985ba64c
-
Filesize
9KB
MD5213faf61753a8e276fe53442b95f856d
SHA17af1ee6312065ad57593ce5dd3764df624a87885
SHA25639924f4371c614b95d9cec352bb1d424f0ba78ffcf8e369bf36080e50d8358de
SHA5126ecebe06d6efa9ef54de6bf43afafd17f15a0fd919d344b7a9351dee455067aa459b87117967ebd69ebe91abbff1e225549ddd0bb78cfe28da22f361c53668bd
-
Filesize
9KB
MD53f4efaac2693843615268bf770165f37
SHA1c659f3a8f6173e30eb652cb32a28f5dcd16db47b
SHA256af7424a4b799eb2e029bc7584bf54c9f39040050338e680e2317b4d9744576ed
SHA5129b3b14de0128d2e9d38b93f30645788555c498da454ec6e0ac9330c78ad19506928e58211014986a7a31f3372b446bac8649f543148de870b6b16bbbc9ea323e
-
Filesize
9KB
MD5d2480f085fb7e168f585c97d2fbdec73
SHA1776e345b76ce43d77014b88ff2dff06adae39e7d
SHA256f06a1314c35b931af6889f12aa976bd55f2d8f77147ab4d9c417a22ab959523e
SHA51254e49483c428474ea8f2609c3ea487f493f74e543bc31e5d0ce433cc9f7d7fab616d36f24186b512d4f4cd27c1dfa8827294105d1f8d522498dba111f30f58bc
-
Filesize
9KB
MD5400175451665d47f274ac2036d4aa47b
SHA1e6cb20b806ec3e35f3db4d6633763dd3a184c1bd
SHA256519454e40168a22b19a46c926e0edf09decc48ecb183a1ace0068f3a714f7853
SHA512aaf13f86daa37ed763d2072fe3a2b27b1349a8249941db828615a055259678839d0b3efffa4fe4c17591dafbfd00248759e821f4da065c2fdaa7fc5e51f89e75
-
Filesize
116KB
MD507eeeb1be622295c1b9fe8cf0e7ff747
SHA18f455c14319b4a9d40975c37d35fed989448be56
SHA256c59462ba4bd741ddb98a1ebcf112f3b5fdf09508f242f3ccef8b4347d74834f4
SHA512971fa09a7c020170b633a6a1c942348641e43d880bbaa8b7e61f71bc58658f68c4638431017ba531139e0275ef1800d3d02c10d0f325597a92e5a3aa3056f8c9
-
Filesize
116KB
MD5ac2a6a10a25258cd229dc9fd3ea19dec
SHA1a8e1cc1dfcbe591a997f14f4f008c6bdb72ace2d
SHA2569dd660156208439f3faedf2665946bb059c47e38d44b750b23380175404c1844
SHA512d20eb8a46091ce1faf309a1dfcd834a40e54d807d4764829d7701fab6317f0f86897db846578f20524ea5a75088c70657750c158c869d25597fa86b96ae8564b