Resubmissions
05-02-2024 14:35
240205-rxzxwscadj 705-02-2024 13:41
240205-qzfrcshae6 105-02-2024 13:40
240205-qyt8cshad4 105-02-2024 13:32
240205-qte8msahen 105-02-2024 13:32
240205-qtc4aaghc7 105-02-2024 13:32
240205-qs85bsghc4 705-02-2024 08:48
240205-kqkfaseagn 104-02-2024 14:42
240204-r22x2secek 104-02-2024 14:15
240204-rkxxrsbeg2 703-02-2024 17:40
240203-v8625ahbhq 8Analysis
-
max time kernel
1800s -
max time network
1690s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2024 14:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.com/
Resource
win10v2004-20231215-en
General
-
Target
https://www.google.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133515315723233379" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 5024 chrome.exe 5024 chrome.exe 1920 chrome.exe 1920 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe Token: SeShutdownPrivilege 5024 chrome.exe Token: SeCreatePagefilePrivilege 5024 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe 5024 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 5024 wrote to memory of 1536 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 1536 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 3704 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4520 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4520 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe PID 5024 wrote to memory of 4452 5024 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.google.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbbc7a9758,0x7ffbbc7a9768,0x7ffbbc7a97782⤵PID:1536
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1896 --field-trial-handle=1844,i,4128605821155787606,8724008231373077792,131072 /prefetch:82⤵PID:4520
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1844,i,4128605821155787606,8724008231373077792,131072 /prefetch:22⤵PID:3704
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2060 --field-trial-handle=1844,i,4128605821155787606,8724008231373077792,131072 /prefetch:82⤵PID:4452
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1844,i,4128605821155787606,8724008231373077792,131072 /prefetch:12⤵PID:2076
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2956 --field-trial-handle=1844,i,4128605821155787606,8724008231373077792,131072 /prefetch:12⤵PID:4332
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4532 --field-trial-handle=1844,i,4128605821155787606,8724008231373077792,131072 /prefetch:12⤵PID:1740
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1844,i,4128605821155787606,8724008231373077792,131072 /prefetch:82⤵PID:4404
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 --field-trial-handle=1844,i,4128605821155787606,8724008231373077792,131072 /prefetch:82⤵PID:376
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2516 --field-trial-handle=1844,i,4128605821155787606,8724008231373077792,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4984
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3820
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD58087b5de9b761e42399cccacbf89bf97
SHA164c561c43904068331ce51c69f27f519282345dd
SHA2566b65de00cc0431dffcdf4420cb5657beadf5fdf0d7aca9a8d6eef3e96cb21dc2
SHA512939099418dd068449ca00efcf3042f5e67dba4a4c14d86ad87e9a5a105b91c4eb6fa74bda884c371efc76dfba4e9ee1b66ca865bef8ce59bb788e9eda07e98c8
-
Filesize
216B
MD5911be2425ca2ceccfb9e11377cc10acb
SHA1e4eaa6a5ca4cf9cce1c7da63cd20b49dfcd951c5
SHA25654789274796722f43ed918917d6c824a78c32a40b17a37519ad0b4c6fb7d71fd
SHA512f22a86b3415240d31da91f5d9bcb9b4e80e8403408cef6dbfe914ca2cebeae762dc921d6ea12f7dd2e88023ef7e076a0ace776f6e476d6232e39fb3f142b20a1
-
Filesize
1KB
MD575886947d54698f260cae0ca2c9e40ac
SHA1d811ff8aaa909f58d102b40c13f5ffb4b9161f7f
SHA2560533dd8ce29ae5f3ce8b43b3a60a1d2c8e4aa93c3a5fd4c84d2ad1f4a4d48460
SHA512f2bd697009ec5ce8e4dd4a53b2260e3f9b6cd6147841453723aeee94ff21c0e98db8b2a3ef6c84cba1ff80d591d490d17e46ca157c2ec4b8cea236b377de516a
-
Filesize
1KB
MD5fd42de9db8051a19fbbad71525f80a34
SHA1772af61d69394efa0389bf5ea9289d2bb6450ab9
SHA25628a0a5a5a876a04ca3632860ec84d92d391490ba437a99264294ec1708aef4ba
SHA51257e932d7042ea4e754bacd2e49db05fc8fbecb7ddb7b36baa0d8e1a3ec1cd2795937974a1cb2b6f454db8ea7fa914e450cf5d8542c6abd015b52918aecd1952b
-
Filesize
1KB
MD59e3967f1e1999834b0de07ff028eb1f2
SHA171ac7a4719e1b5bb8b1e096ada4217efb5c0726d
SHA2567f87f61306f6d5ad254547e89a42e0c2d772d867769d6ed0ca727de5a2d51e34
SHA512aefcb56c4e90c0b41251a6138ebc417207adf764a29293d2a24a049762101d8303505ae1ab60dc1f4adc1bae3ddb8e008a9cabf752fd35a38458fa759fd6c2c5
-
Filesize
371B
MD5873e9455a762952f1b79fdaa13fd5d66
SHA12f171e1a005aafee26fdbd0596e57e23bc452451
SHA256d4d2b1df524f54bc267cb6245a26f0c545e151be6940b941d5861c29265fbbe1
SHA5126898fd01e91e92a2ec1d4ccfffca1008d1c9e3a0e5b9a75cf419d7f427055dd1eb896f4a9f63357a1f89d917dfaa4898ea8a19fa5937afa609eb26b65302f10c
-
Filesize
6KB
MD5ccf71498bfe82e1db2d71b1ea298b9c1
SHA16d65ef6f9f30eb682ba561885d993c5fb681b745
SHA2563887253a00da2897b72729d9bee1f9af430bc92fc940279fc11a72370f57347f
SHA51203a6c7d14ee024dae8e99ee0543f8825e997c6424da4f69de1074dbba05a007c9d457fbfcc342b9d2c18d6eceebb48a98c256578214ca3fe80651388ab4e09ca
-
Filesize
114KB
MD530812e5c37f9fa684f405953392703d9
SHA1b5b36c691432d54632a9e995b3a46ed8e93a4838
SHA256d9f09587e845fa177128302e920be0347d862428bd241c6352a54e1ad481187c
SHA5121f5e64d12a684d2bf16aaa77880ea3c58f209729c628b8dcfb949f1285d895861bba5f9410b7025de4b9c6d38011d667fdf7f4325ba6c6692d53bce4e9e0a9ee
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e