Analysis
-
max time kernel
840s -
max time network
894s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 11:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?export=download&id=1qiGFtovPo8iSTFMbtlwZHUl2_mPjSIxz
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/uc?export=download&id=1qiGFtovPo8iSTFMbtlwZHUl2_mPjSIxz
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 11 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 744 msedge.exe 744 msedge.exe 3024 msedge.exe 3024 msedge.exe 900 identity_helper.exe 900 identity_helper.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 744 wrote to memory of 3596 744 msedge.exe 85 PID 744 wrote to memory of 3596 744 msedge.exe 85 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 2368 744 msedge.exe 86 PID 744 wrote to memory of 3224 744 msedge.exe 87 PID 744 wrote to memory of 3224 744 msedge.exe 87 PID 744 wrote to memory of 1636 744 msedge.exe 88 PID 744 wrote to memory of 1636 744 msedge.exe 88 PID 744 wrote to memory of 1636 744 msedge.exe 88 PID 744 wrote to memory of 1636 744 msedge.exe 88 PID 744 wrote to memory of 1636 744 msedge.exe 88 PID 744 wrote to memory of 1636 744 msedge.exe 88 PID 744 wrote to memory of 1636 744 msedge.exe 88 PID 744 wrote to memory of 1636 744 msedge.exe 88 PID 744 wrote to memory of 1636 744 msedge.exe 88 PID 744 wrote to memory of 1636 744 msedge.exe 88 PID 744 wrote to memory of 1636 744 msedge.exe 88 PID 744 wrote to memory of 1636 744 msedge.exe 88 PID 744 wrote to memory of 1636 744 msedge.exe 88 PID 744 wrote to memory of 1636 744 msedge.exe 88 PID 744 wrote to memory of 1636 744 msedge.exe 88 PID 744 wrote to memory of 1636 744 msedge.exe 88 PID 744 wrote to memory of 1636 744 msedge.exe 88 PID 744 wrote to memory of 1636 744 msedge.exe 88 PID 744 wrote to memory of 1636 744 msedge.exe 88 PID 744 wrote to memory of 1636 744 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/uc?export=download&id=1qiGFtovPo8iSTFMbtlwZHUl2_mPjSIxz1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdcff346f8,0x7ffdcff34708,0x7ffdcff347182⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,15029632313616029668,7719548291010228359,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,15029632313616029668,7719548291010228359,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,15029632313616029668,7719548291010228359,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15029632313616029668,7719548291010228359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15029632313616029668,7719548291010228359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2212,15029632313616029668,7719548291010228359,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5028 /prefetch:82⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15029632313616029668,7719548291010228359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2212,15029632313616029668,7719548291010228359,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,15029632313616029668,7719548291010228359,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,15029632313616029668,7719548291010228359,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15029632313616029668,7719548291010228359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15029632313616029668,7719548291010228359,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15029632313616029668,7719548291010228359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15029632313616029668,7719548291010228359,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15029632313616029668,7719548291010228359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2096 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,15029632313616029668,7719548291010228359,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3436 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\7ed99587-1568-422f-bae7-42bccac3bc18.tmp
Filesize710B
MD596b7f4ba47850e93f24b523033281426
SHA15167e5cc8ca5dda7d7b8ea0e280b3f5e8d1f7190
SHA256b87549fc9577d2bc70644760d0953d70937d9ad74d753bc80ba6216e77473903
SHA512322a4c116f5a955c6b84ac88a15d6f059e5fe2f9cb566fc514238466594c04d1ad3844420e8a62270e3e3fac308f4d31fd67c11029738b7de65f8ea3722f5987
-
Filesize
801B
MD580ad6e2b3fa5ec949f777553236b7c61
SHA162fac7b39daa36d2c892ef5ec939cb5e55dc65c1
SHA256c30879f7ef7c6d01627f842245ebbd3a2321ecc830b7c423acad298ce84a87fb
SHA5121f3c804fc6ace2b7d19c6b477e8c5e4bf2ce3f6c351e62be6e2165837023fcec37ac55ef8bac995b41f68c9d5a17f93920eab10f10333b7dfa9c826d2f17de91
-
Filesize
6KB
MD5ef8f23a420d1052feb5e9b3ccfa8d274
SHA137c83b080d99544d71fa5546f9810d97fa017228
SHA25660de92d22d0220b8df2e9828b503513dbe0f576f98849d70de89ba88c5dba451
SHA5128c98de5b84b8e40f7f04c9908c257d79a97adf716616c4bf15e5154909e59c32644d1fcd136a08e45cb4589408dec23d05bc0947185f584fce0036a059bd60e9
-
Filesize
5KB
MD567f7ecf3eef6a8f2113e6491a1e590f1
SHA117d914553cfa2b256f1a0366d9342f5cf70c0879
SHA2563d907afaf4571705df8442b968165508c42c850d36b7dcf29897e12bf0ec860e
SHA51288304948abc0a7854e3ad4565587e7309c93ae32bb636d89de57f66f7b33676872892a5b14cc9d65c63fdccab85b48a7ca72bc206aa9cd28000930b0767b947d
-
Filesize
6KB
MD56ea53037afafe32aa0aae7c77510c2f0
SHA120f63589dfb7bf40040c079c3a1135dd11e29fbe
SHA2568ff650eec9c204e3dedc1f227cbf9bbebb452f48323dd69888d8a84b50ab17c1
SHA512b9f066a7b6921e21125ce114529e5a01835e30cbf85646db28531e363742f28e73b402e5690c0989d17ec58202d16b8e47ee27c8a69f4456599597aad23baf20
-
Filesize
371B
MD515d76ae8b0acdaea672595f864814e48
SHA13664faf7fb14d60e569e80bebf5d9b0752a1311e
SHA2560d32d0ba356765750745a0ef2091661d9bf0dd808ccf9c57de4e85fa59a5f341
SHA5123221649542a32ac9650ed2e9acfb8adfaf1d1c91b1be8d7b608dbc481a85d16fec26b3ee0b049372401409ec09b2226602602d229bc8ec7684e5579ae63b9902
-
Filesize
371B
MD51501d1f7a21eefd0dc56b8527ca16e66
SHA1170739b7275bfa5cb7cdbe4ae935cbdca454f601
SHA25671d56a8e1454b0e2e2153f64a64ea242a616ee13546628ab786f8edc05b6c971
SHA5120910d057200bc111b4dd8af7de9e9517cd862a182f74f5d64676a642abcca8c7fd6c2f8a6e79865fe5d1de32ab59f1de1e4492f5c8d51ac36604c9c02e88dd60
-
Filesize
204B
MD59d42544b9623bd11d4023b6b6afabd6c
SHA11618c55519dd1bcb47a4fdf425041cca2081ccef
SHA256a8ab8a130f082d1bc6331cebeb24ef0fa701e08bc64be711c4a9d78524a49605
SHA512518a7725192413ff8a31bb28a74e7b8455e3b5c755840fb9300f0a80fb800ca8f9181126c8619104bf3b32def3cf6ae649950bd9240f90f3baab3d833df7767e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52bd17226ab630b1bffa1cb4105c26a8b
SHA190d0af7255255253f853b10195ce6ac64b7b89df
SHA2565a6dd8d37f90346345409a6153c99162faf9e6c2184130309fc320cfdd95a91b
SHA512d714f5e919e44ae1f0bcc775a11d64ff4cd7ac9663662fc829e47f849bae8de3a25d8041da0a8581cbff21e8affa5480a7c27e467c1aff36790a73212aaa74a8