Analysis
-
max time kernel
1799s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2024 13:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bitly.cx/jEJ4
Resource
win10v2004-20240426-en
General
-
Target
https://bitly.cx/jEJ4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133592163638887924" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1496 chrome.exe 1496 chrome.exe 4760 chrome.exe 4760 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
chrome.exepid process 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe Token: SeShutdownPrivilege 1496 chrome.exe Token: SeCreatePagefilePrivilege 1496 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe 1496 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1496 wrote to memory of 4272 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 4272 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2692 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2304 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 2304 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe PID 1496 wrote to memory of 1888 1496 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bitly.cx/jEJ41⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa9e6fab58,0x7ffa9e6fab68,0x7ffa9e6fab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1908,i,9836037409189441915,17067185744919852035,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1908,i,9836037409189441915,17067185744919852035,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2196 --field-trial-handle=1908,i,9836037409189441915,17067185744919852035,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1908,i,9836037409189441915,17067185744919852035,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1908,i,9836037409189441915,17067185744919852035,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3576 --field-trial-handle=1908,i,9836037409189441915,17067185744919852035,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3436 --field-trial-handle=1908,i,9836037409189441915,17067185744919852035,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4656 --field-trial-handle=1908,i,9836037409189441915,17067185744919852035,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4524 --field-trial-handle=1908,i,9836037409189441915,17067185744919852035,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3924 --field-trial-handle=1908,i,9836037409189441915,17067185744919852035,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1540 --field-trial-handle=1908,i,9836037409189441915,17067185744919852035,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
480B
MD523355871f2d4b48e062b054878665bf1
SHA159cbf32ae8c0e30f3c781c007fa632f05b40d58b
SHA2569caf4414e756bba5f4e7c4fa2740305f4de6d00c48b0f7999210a91f4c8c53ee
SHA51227ba37e0443b62b7b3f33f70623a8562aead31d3101c27c351e35c13d6913c7535ac206104e520affd717bcc0ea77d57e6c0b3ab2eecc8d6d2fde0b754104fc6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD56178f1df3a90e4064b0450a426d92e73
SHA1099ba726cd15c4430940a86d6704c01c062a4cbe
SHA25644b067f7c0077cbb083f8d54e6a08ddaeddd5aa60e760bbf17f5963e595a7fd7
SHA512d79b74ead37704c58d585c5d36c6fc36e1690aa6485b6aa0e685953153dee4c7b175046c07a7de511eb7e32d7fe07a41eb1d6ac410d27a5ca921c29a685818f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD54e537e6af5cfd6907c8fadf81b145618
SHA1580b9ea9956415fb8337fab8693a4b095de6cfe3
SHA256b3dda00ce0c2b5370b6d2469a586ff32f58acbf06063a42f893f8b3c2aa42ead
SHA512d85212ad6c70fae48006316c86fc5d8002268df6cf8cdf8b670d2369f31f4a296a1b0811c5d240a402526abde1e8a4e2496d4a6b4a8e951659c3418a82f30da8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5d59c93a4be429170ca5c999ab4a5f256
SHA176988f7dcd3d9712133cc5c4eb5a3320f41a007f
SHA256dd1d71678b8a0e358a406c4f38f9d0dc124c4640b4d340be51be5f802900c2c3
SHA5125cc618b4e5cb1e2efa19a6e07e7dd0724fa5220513ad49e541f346077c92d616d9218021c51782efe3ff09bf21df629ef14ee6a492d357482c6bc295410997d1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD538698c9ffdef7763485ab882a2a80c47
SHA15652c645085440735fb7af0709a9bba383bb0ebb
SHA256a395493af4befe0947f2f224fc7d2d4a851fc29efcbe3e4f7795967909577939
SHA5120086f132272a580d1a2e715e0fbc53496613473507ed704cce0c179077b7a82316cd7a2ec8b47859754df178051fbc9e9a59851a17bdaa025ee88b9846b3c98e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5906b72834c0eb2f9268e3a9eb2ae7352
SHA161ef88c092187fef1b7a41fb8c26e128d7254cda
SHA2563e2eed986939257cfeec44f357627663c409a5aca11380aa03ff2bfaa10a38a2
SHA51289f4c016a214c60ff653b5d59de611a8f22729986f083942b4fc0ee06fcb44d7477cff7cc7d68fd5395df84b3ace8ccff9c57303b6b4fdff2c874fe29bed9d6f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
130KB
MD5e10da3f8124f576a3fce63c21f3e99a2
SHA168466638fce782864c51fa6f80c6c9b9b449b6d1
SHA256929da6021b2654467445260064dd9efc56ff25125017025425ae6724e2f8f558
SHA512d8b21cdf4ab65dc95ddf3f88cc66779f7a4f02a72383e063f798c850a3b999a34945ccbe2f08c3ba47f3dbfb5df6e04dfe834069600710c570c9b31911c07154
-
\??\pipe\crashpad_1496_WPBCOLXQWVLDSZGKMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e