Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 02:39
Static task
static1
Behavioral task
behavioral1
Sample
View_alert_details_DY8G.html
Resource
win7-20240903-en
General
-
Target
View_alert_details_DY8G.html
-
Size
4KB
-
MD5
d041f88503ea9ecc95770655c12851dc
-
SHA1
5fd944847b3c923554b2ee89557209bf1c24ee7f
-
SHA256
0c9f9abc8b8d7eda88ea7e297eb8b94f6b2054032e4aa217fe2ef65af653f9de
-
SHA512
7b6f4b9b05f7fa2fdb102aaeb28879a77d8c7ee0632e3b1a3c33bbfbb61f3c2f5a534fe61b6a7391a62ea048a594a9a7fff766543d04509a9b065ea3f25a10e4
-
SSDEEP
48:48io98CmDsXwWxp7Vx8uYOVWcZyTpJWuAUn2DSardcAY742ZdG5Qv48RGaQItTY9:3fmExJ8eYtJ/A1RbPv8RGlItMoUcNQz
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133767168231464081" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3736 chrome.exe 3736 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe Token: SeShutdownPrivilege 3736 chrome.exe Token: SeCreatePagefilePrivilege 3736 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe 3736 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3736 wrote to memory of 4044 3736 chrome.exe 83 PID 3736 wrote to memory of 4044 3736 chrome.exe 83 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 396 3736 chrome.exe 84 PID 3736 wrote to memory of 936 3736 chrome.exe 85 PID 3736 wrote to memory of 936 3736 chrome.exe 85 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86 PID 3736 wrote to memory of 4004 3736 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\View_alert_details_DY8G.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcc30bcc40,0x7ffcc30bcc4c,0x7ffcc30bcc582⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1872,i,8902638424679034990,16334893239229323028,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1896 /prefetch:22⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,8902638424679034990,16334893239229323028,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2172 /prefetch:32⤵PID:936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,8902638424679034990,16334893239229323028,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2420 /prefetch:82⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,8902638424679034990,16334893239229323028,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,8902638424679034990,16334893239229323028,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4624,i,8902638424679034990,16334893239229323028,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4640 /prefetch:82⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4704,i,8902638424679034990,16334893239229323028,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3852 /prefetch:12⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4984,i,8902638424679034990,16334893239229323028,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4840 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:876
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD52778400f548fc9fc4e50e20391191242
SHA108858d92d84c95aecca94367d5eb8ad679f6e079
SHA256f43ca90ccd1cc66c7c236747891783e915f7fa20b47fe5ee758b17cba5c57303
SHA512fec86b4b47d1020621d354dc07eaa71a23c619a0e1f3cc15652b0e5e771e0a9b5dd1c682534c362204cb65745b2fd72dbffce0318c4d294934f4b187697c7ca3
-
Filesize
2KB
MD549a384ef87e91b1295a80c43f9e1160e
SHA1102a69fb663be0efe56642fef961c35f6229221c
SHA256959c41fddbb8a5c88aef2f08c5024b22baf3f90ebc62add7e05bbae5ce439f4d
SHA512d038f634956d06e923b59f0cafec1901a4c1625426488b58e4ee6337db4aee8e03406659af593eda3562b45604961a37bad29378cd2cd72147734b9d111d3d45
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD50eef31ca24cd7917b831d1e22b391d63
SHA1360afb7a36e488a1dda43b8e95304c3843d79091
SHA256cfff563ca6791467290e600484b189f723126c8775e67724172786b575dc4cba
SHA5127b1bb5bca5e28b7d23564b802908074a1460a54a86200b4a63e699e751fb1e82bc4a7d6b727d0cf01283074eae28f3a717f617620b2244a6ef052d637f9450a9
-
Filesize
9KB
MD5698cea3453c6b80e06d5d89c47513733
SHA16f59c41d23a8377dffe8ed18b85c77287a207289
SHA2566ce949234ebcd572dfedc0cb7d2dc42c4ebdb760445a3e6c50c402ffd9261ea2
SHA5124d271b4cc5da71694e581066f8a7b72537da3f2c69ff98566a769a1d83a78ace4043df411af48da4310ce967adf0318473dc0ca670afedc5984befb7be7a9f0e
-
Filesize
9KB
MD5181b19d2db4caa8ff58bdb39e3caa7c3
SHA1b7d12fb47d4068095dc3f6049e1076ed21cc95f2
SHA256d56b40293912a0b6e43bd652385ef1bdc2bc4f9ee5235a15d4981307b3b6ded6
SHA512223832e3a49e1792398e6f231ebed3d5138cb995b320581414a05c036b40406dc50131f1f7b7dd072d077e51ff88c93e1f36f36d023cee053aee334ca4e5a2a5
-
Filesize
9KB
MD56e177ac1af7cc170d4f5a91ac3c10303
SHA19dabe59f7a76cacee23701fc8f0de809339c1ef8
SHA25602746345b2974d499bbbb857a57047756cf8f9d88709e4abd4c41af48706842c
SHA512170da7993f2e49a06de54174e5734af62f4b118811d08df5f7dc333c5d197a81bdf3382e68c2a03c8cda981bdff3753d2949add6f4b2fe60877e99433b471d9e
-
Filesize
9KB
MD5a5195ac5b5119db36ef5dac866c980a7
SHA19e162b5810448c47e573c5f614d7a934dcdfdfbd
SHA2560452e40e969e5aa35575acc7d19b597ca201764acf33200b31467129b9eb81ac
SHA512642ec53b6428394b016f9c7263dd83eb91bd93ac51baf8be978244b608a5ae40289c1571c78bd329dc612f4bd8004f5cf32aaef2e92eb8d58ee491be9b87dd6d
-
Filesize
9KB
MD5ab934aa50b76cbc7321338a8b77b48ad
SHA174fa45c0e534d570872fb4889a4cee27e5856869
SHA256466732884057b55ae17dd658cf5b37ac85195f2e309dba9e5f594cddd2b9ac9e
SHA5124191dca1fe67011b971ffd90e760b0556e4351261b78f08d890008c3c806b94546d337e78d8600b046942e6cf7a0347a963c8380833c869caac53d4744334224
-
Filesize
9KB
MD5ac424c4130813016331201c9b25a3750
SHA17a5bc1ca47977b1090f735eccee57c58d51c55bb
SHA256b6731d0a32799f639f598f453eb70e690a31152743d5979f2bc568568bfc6589
SHA512d34d8a390ba0865e05d1c77a6b0e93604b7cba2b8aa8d47d92ec16d352a9380ec79cb9f29a2d58d141a2e1f24e5af182607e40f3749cc342120186842fa67a13
-
Filesize
116KB
MD5fd39a9b4d5b46d976c1dd65c3b73ff8f
SHA1163aa56eb005c58c080b9e7fe12c446f52772253
SHA256c7a1f6f66bc79792692c09d01b527cd9f48029c8028fec1c5d90d11847ae43a0
SHA512ed2b7e0d233247771dc5347e312f1838240e43f1d8d8c7a19714dc0f6334f4eae011da7c402596c022fa0a3d29cf54a9884bca200801042d2d5a08fca00a5ab0
-
Filesize
116KB
MD51d51364e9878422fe5e2239311154902
SHA1abe6379216f34bf4f354fb048b6de1af1f480e50
SHA2566b7e23c67ed4468705ab17c8b8ecbc522cfab866ee170253920ab54bd12c6146
SHA512c6f56ffbf9fe6c33a112b9ab54feea78a6690f6e5840c683ef5032c0d1114f20b7df78fb958c0df21ab7df598496c1e2089d31c59322c44762d586eab263162e