Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
27-04-2024 22:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/ismail50490/Roblox-Electron-Executor
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
https://github.com/ismail50490/Roblox-Electron-Executor
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://github.com/ismail50490/Roblox-Electron-Executor
Resource
win7-20240419-en
General
-
Target
https://github.com/ismail50490/Roblox-Electron-Executor
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133587305486312780" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 3996 chrome.exe 3996 chrome.exe 4512 chrome.exe 4512 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 3996 chrome.exe 3996 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe Token: SeShutdownPrivilege 3996 chrome.exe Token: SeCreatePagefilePrivilege 3996 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe 3996 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3996 wrote to memory of 3520 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 3520 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 192 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 2432 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 2432 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe PID 3996 wrote to memory of 4160 3996 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/ismail50490/Roblox-Electron-Executor1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8b3629758,0x7ff8b3629768,0x7ff8b36297782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1840,i,18038621958610877428,16423197465957279935,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1780 --field-trial-handle=1840,i,18038621958610877428,16423197465957279935,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1840,i,18038621958610877428,16423197465957279935,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1840,i,18038621958610877428,16423197465957279935,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2924 --field-trial-handle=1840,i,18038621958610877428,16423197465957279935,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1840,i,18038621958610877428,16423197465957279935,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 --field-trial-handle=1840,i,18038621958610877428,16423197465957279935,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 --field-trial-handle=1840,i,18038621958610877428,16423197465957279935,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD5407640970b165e9b7d806a52508b5b22
SHA1ac48ce62946f941512ab973ab1f503d27d11470a
SHA256230264da78abd4958c00bfe682b051dc95e2052e4fed3a4d6f9b32d3f60a60b0
SHA512d06781d962ed396a4d2cd674ded5254d812ec0933cb338881f337c9e51f4e1f1afcb54d540b6fbc6e9778f3c80c2787d912bffc884be95258ceb466330ac1752
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1023B
MD59ebc0c2a6b7c50aacb48473ea648a2bb
SHA14489e6df8f60295c704fad9827211b481788e568
SHA256bd17daab77c29d0f1383964b06064fe847e61bec0d706b75a15711cb3b20803c
SHA51269d56fd06cc19625b758941966621676928b66a7e2bfcbaff3c8f9bb5b8b8b19730a347925ef00e38e8fe1e3dbbfbcb54ef0c7dc08de0f5eb13c770f9926b084
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5c8de5091ae13bcc4aff0d4363e523a76
SHA1c0fc98a64e3f305fe76c1d59cfcff11260c39bc8
SHA256243ef834df3c89a9f83c282633237c9fa635f6198899c62df8d7f65758f0abbb
SHA512efa850c18a3b413898802102298d1c3301270d439172b78bc329f65167395f9e057de5f4e270b42e7b96b7b1c2f675c1341e0caa008ae66fee21ea859ebd8b32
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5d5cbba54afcd192b4803885a250b8920
SHA1a628ebf2d6fe668db408be851bce60a996d06a56
SHA2567cdc1591c3dec8608e94a605a9b5739d46aa9813f3702b7773b55ab7dcd1ae83
SHA5126ffb978dc8199ad87a1171b5524df7a2b414750d6d85c4ceea4c3ae7942dbf5bd136273e36578da1263311f8ff3b274b9a1787fa6dce713d84c8f477d820d8a8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
867B
MD5265372970de806bff09d6ec3855d5db4
SHA1d030aa1228c9ad396901c9cd3960629eb63504e3
SHA256c3d3dee70950d2a362c1b0a5fb1fa988dda9b55a6d82ee4940ecac41a86a005d
SHA512028f4ad19b4a29ea094492943a4a858e51cda8a5e1156b96c6e99f3ebdafebae106147f05f474281ec6c74cc6da288b6b08430ef018e4072527bfb7333bad88d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5935886e94d5f9787a74a3ef251664543
SHA1cce759af4f9ee5bb8c337175de813153dabe880f
SHA25677f41925020f5768054b8832f16356b1aebad1d8f8988e572abeaa0661ee0a7b
SHA512a460d020b1e338326037bb26d82eb53b44e46993453d07a25d7dd139705828ea384612ec89d1382ae5fa09c5e2b1edb82bfab8fb7f8b30203be1df0d85499026
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5acc20a9f58689d093307be7f1964546a
SHA16a7706b187ea34365a1a21ab17f20f1379253077
SHA256d11e36c31a5ff004162cf746d0b4cc436983d7db25e4508de17e2ab31826ed43
SHA512cb5685ea62a54fafa1952a068f7013fd2cf5dffeef7d1736ba7945c0102c7fb64e6ca75d97a35bf65c631ad7dd3776caad58d03469db53ed4b3be1ab197b3124
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD557ee2803cf100c497e4b0bde3154ebb0
SHA121297d5d58e3942626e9747061f7baf53bc6ab3b
SHA256d7e28f938df2e4cc5db94956cc0627d9fa8938b9fd266379b7b99f3b15654ca0
SHA51285e6daff34f96be550664b206e3d5412435add53af98d3605a8769d8ad5ca02b5db0a76d861f76c20315f96c9965bf97d1b843e84f43374af2439cc791cce8b2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
136KB
MD5b82df0b23337cdea8ce2137c36ee5465
SHA11b9762ea7bb301a770e9da26d26028f3b76f8b9e
SHA256cbf76f854cd60c5b3992bdc4778bc802ab374ea2e183ba6772cf23bafe5f305f
SHA51206b2ebb4f2c40f7b88cdaaadafdc9ee43bcf440021c0d025ea284e3863a6c767eb645451db979e130227d2f3508175c4a43c1ba39d364073c535d84a9bdbb4d0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_3996_ZGWJXEPFOXXEMDVAMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e