Analysis
-
max time kernel
125s -
max time network
125s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
02-12-2024 22:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/14nvUtR0d8prxdJc5vpxn6fqOGSFWD6k4/view?usp=sharing
Resource
win10ltsc2021-20241023-en
General
-
Target
https://drive.google.com/file/d/14nvUtR0d8prxdJc5vpxn6fqOGSFWD6k4/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 10 drive.google.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133776519444419516" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3128 chrome.exe 3128 chrome.exe 1656 chrome.exe 1656 chrome.exe 1656 chrome.exe 1656 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3128 wrote to memory of 3328 3128 chrome.exe 81 PID 3128 wrote to memory of 3328 3128 chrome.exe 81 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2348 3128 chrome.exe 82 PID 3128 wrote to memory of 2784 3128 chrome.exe 83 PID 3128 wrote to memory of 2784 3128 chrome.exe 83 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84 PID 3128 wrote to memory of 1164 3128 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/14nvUtR0d8prxdJc5vpxn6fqOGSFWD6k4/view?usp=sharing1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffc0f5fcc40,0x7ffc0f5fcc4c,0x7ffc0f5fcc582⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1888,i,17044684628043074095,9717622159228648479,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1884 /prefetch:22⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2184,i,17044684628043074095,9717622159228648479,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2408 /prefetch:32⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,17044684628043074095,9717622159228648479,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2416 /prefetch:82⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3136,i,17044684628043074095,9717622159228648479,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,17044684628043074095,9717622159228648479,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4484,i,17044684628043074095,9717622159228648479,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4524 /prefetch:12⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4356,i,17044684628043074095,9717622159228648479,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4868 /prefetch:82⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4872,i,17044684628043074095,9717622159228648479,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=1624 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5e3cdf0b5e0788030af8a95037d9a74e1
SHA1f2d536f0bc57b936ff7be5ffe637973aca733381
SHA256e199aba810fbc8a0068a929cfec024b815ed319b9b66060a1686f6055a81211e
SHA512ee8e04920a5b1e97d90b8ac9e022c12b033f9680cea152e73af46f3ea4d98fd335411c19be1a71db5d58b375d668bc911e02c8b300922718fc435c80f22a5a10
-
Filesize
408B
MD53798b52f016ae58e75f2aa52e78c4d85
SHA1b32d101adbeaabcdd4452ca1c664f04b2ea9e48f
SHA256836cd5d43316d7d81bf8d7883d3de71a66ddf1de579a01acaa5225d530c0d556
SHA5126dd7d1eef4dfb81e6d2530800f554b2176f485660e79e9e1eca0e67bd023a2355c39a09af0e1d862a98f50b21192ce9fdbc8bd74db01acff9393793b7b5753ad
-
Filesize
5KB
MD5d19a3349d9ce4d596c06e4eba34529c3
SHA1ff514b44070c56cb064f933c9c73a7ba21341de4
SHA2562f0deef117903d2f169049934e7e4cb9d564991b9f9f8ebe3e841ebf38633c38
SHA5125726f1382f3e28a74ed8d7bfd0c541ad40c16eb300b2c38afa0e9c2f1f4ec1de1ac36268375d0c617c72d11c9d27dbb028fb819c4305b94f6faf8503c656c91c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5b9899bdfac115fc6d51695d912124136
SHA136af61763421a3d27cdb9088ca6128f2f32eccc2
SHA25629d1e6d1e74101bb3e9427143d7f70d45e6cd0aff932d044a4d70367ba6e7144
SHA512a18bae70446c6a6f9ab60114cf886834d44f3d5bdc827063469cdbea768302819d43b5506a90360a7b60dbb7beec32e5599c495d1b397ce5859a3d25bd398d31
-
Filesize
9KB
MD5b07acf2ae6e43c37c0a96565cfa630e0
SHA1352e0c8ad37f0c152efd90d68753665df321f3cf
SHA256974c4cc6f47dc4a5af34dfe73637fe6a670e18709526ce6780a08375914ebe99
SHA5129564ee801e0b94bf941032635d6de27c214a07cdc42ed47d8ba72f1d09b8ba26662841517840f12727a93d881fe2fde8ed187919f1c876bb8ec37662675137e4
-
Filesize
9KB
MD5000481ab90bcf7c6fff730ea47555f73
SHA1e374b31adb305b3085d61e975603dae53d174bb0
SHA2568a49f04560f3ab349c285ca2b2cf429d7729c9ead8a3ccc03ce4f883e2b3dbaa
SHA512dc22858ff4650b3e988336b1c2d57cb5850afee3180408199689f9ab5f73aaf9f153b21c81fbfb2204bd40f181289a50a67e203bae9dec49337a5c8fc8589397
-
Filesize
9KB
MD553336d3e094fd4307c199c3169c96540
SHA1bdc6f96166da004bb43cf1b3babb32d32ca21dd0
SHA256c9dbbc6fc906d9df7a6759a2363a03a9f16b0461123316d04bf1b857dc8158f0
SHA512c5719d26e79340b85b28698b66f7df807874e47bf3184c805c50e60fac8b20a920eb4c267e2a52243411c07f6a7d70fe6a0c390401126dbb874c676e9f3c7b0f
-
Filesize
9KB
MD5c82cf4ff4b47cb021915ae3dcf6e125b
SHA1a34128049b3157dbb4bd2711ce4d8ab3c9eb39e7
SHA256d46c802e79cb884cdcf3389e0f088b3778d95c5ee2f79abdaaa7752420af1f22
SHA51282f3f26bcef7f92b64fc95b8e4a0d20cddd7336b3815c4bfa08195d13943a769eef558e2fca8605b0cecbae79d62c85f0c834e0f89a9752c46731a214c767c3b
-
Filesize
9KB
MD558903b390edb0145c80eb5d49e17c05a
SHA1575c2d23acfc0aa9b85cd01252ec875ce35e5da0
SHA2562b53ca276f5d4c660fc884ae74a1d3345ea36f7898a4a8c1ad082653839c90d4
SHA512883a2f76b78e1aa00dca472d129156eb4f54990ace02e565bd8c49b36f90a4ec333f4525def9e863f0160edd7964c98932bc32669047885dfb8b11357cdc87a0
-
Filesize
118KB
MD513940516bc0510cebbf6daa1b04c1ae1
SHA16cddc64c446a71a6626ad1543b6cbcdd2a74ead9
SHA256f9386715e8a15b882dab42fece2c8c984d9d652dea93845475a2d7b772549081
SHA51244bfe0116b52bb1efc057e66d606adf9ce7c55cf3988492604ce42c082508eaa98e083dff8976bb2966f69d9621f422269d6ae389d147bf5aa2759a579dffa09
-
Filesize
118KB
MD5e0b1a84f055db2acfc0d670d59858457
SHA1a47fd89d3279b98d37dbaff455dd2065651b25a6
SHA25617d2704b40ca3d013724a43670cb3b575803ceb4d7036e75e2620567bfd73e27
SHA512ad095c20d1fff6d7a07254b05b5d8f7cc36526b0863d69f7b8b10ef066f2c974d118cdc65f8af30a1f603099dc8ccb1eadc802cc44e62e295c07bec890b6f3a9