Overview
overview
10Static
static
1URLScan
urlscan
10https://www.roblox.c...
windows7-x64
3https://www.roblox.c...
windows10-1703-x64
4https://www.roblox.c...
windows10-2004-x64
3https://www.roblox.c...
windows11-21h2-x64
3https://www.roblox.c...
android-10-x64
1https://www.roblox.c...
android-11-x64
1https://www.roblox.c...
android-13-x64
1https://www.roblox.c...
android-9-x86
1https://www.roblox.c...
macos-10.15-amd64
4Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2024, 07:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.roblox.com.bi/users/5445740091/profile
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
https://www.roblox.com.bi/users/5445740091/profile
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://www.roblox.com.bi/users/5445740091/profile
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
https://www.roblox.com.bi/users/5445740091/profile
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
https://www.roblox.com.bi/users/5445740091/profile
Resource
android-x64-20240624-en
Behavioral task
behavioral6
Sample
https://www.roblox.com.bi/users/5445740091/profile
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral7
Sample
https://www.roblox.com.bi/users/5445740091/profile
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral8
Sample
https://www.roblox.com.bi/users/5445740091/profile
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral9
Sample
https://www.roblox.com.bi/users/5445740091/profile
Resource
macos-20240711.1-en
General
-
Target
https://www.roblox.com.bi/users/5445740091/profile
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3128 msedge.exe 3128 msedge.exe 4784 msedge.exe 4784 msedge.exe 4228 identity_helper.exe 4228 identity_helper.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4784 wrote to memory of 2436 4784 msedge.exe 83 PID 4784 wrote to memory of 2436 4784 msedge.exe 83 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 1032 4784 msedge.exe 84 PID 4784 wrote to memory of 3128 4784 msedge.exe 85 PID 4784 wrote to memory of 3128 4784 msedge.exe 85 PID 4784 wrote to memory of 4376 4784 msedge.exe 86 PID 4784 wrote to memory of 4376 4784 msedge.exe 86 PID 4784 wrote to memory of 4376 4784 msedge.exe 86 PID 4784 wrote to memory of 4376 4784 msedge.exe 86 PID 4784 wrote to memory of 4376 4784 msedge.exe 86 PID 4784 wrote to memory of 4376 4784 msedge.exe 86 PID 4784 wrote to memory of 4376 4784 msedge.exe 86 PID 4784 wrote to memory of 4376 4784 msedge.exe 86 PID 4784 wrote to memory of 4376 4784 msedge.exe 86 PID 4784 wrote to memory of 4376 4784 msedge.exe 86 PID 4784 wrote to memory of 4376 4784 msedge.exe 86 PID 4784 wrote to memory of 4376 4784 msedge.exe 86 PID 4784 wrote to memory of 4376 4784 msedge.exe 86 PID 4784 wrote to memory of 4376 4784 msedge.exe 86 PID 4784 wrote to memory of 4376 4784 msedge.exe 86 PID 4784 wrote to memory of 4376 4784 msedge.exe 86 PID 4784 wrote to memory of 4376 4784 msedge.exe 86 PID 4784 wrote to memory of 4376 4784 msedge.exe 86 PID 4784 wrote to memory of 4376 4784 msedge.exe 86 PID 4784 wrote to memory of 4376 4784 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.roblox.com.bi/users/5445740091/profile1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc100746f8,0x7ffc10074708,0x7ffc100747182⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9251437535649431392,4862742416989307339,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,9251437535649431392,4862742416989307339,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,9251437535649431392,4862742416989307339,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9251437535649431392,4862742416989307339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9251437535649431392,4862742416989307339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9251437535649431392,4862742416989307339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9251437535649431392,4862742416989307339,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:82⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9251437535649431392,4862742416989307339,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9251437535649431392,4862742416989307339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9251437535649431392,4862742416989307339,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9251437535649431392,4862742416989307339,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9251437535649431392,4862742416989307339,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9251437535649431392,4862742416989307339,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1336 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD57b3ed2198cc588511113e39484712df7
SHA154877263ea874d842882655d921f91aed43230a9
SHA25600434f86a5dfadd0915551bc1016faa5c25e828573c61e2833c993c84f0f07a7
SHA5123b93b599b0afac710fae29796f7cc92855d96f699d9deb11c41e7e15ada4b0debb22309ec9d7638bde4996c2a0590920f96cd61373b933473273f22340ad0146
-
Filesize
2KB
MD5778b72fc80ed147e0b768f2f5f580497
SHA1194bdffda3d42c90550fdb4df026441392143f5a
SHA256c78bf52142ac1abd2ce9714a4917fd18a76b15833c98f00252e6c230e822154a
SHA5121ee17d05660580b7242652ba79bde1b6a35e212fcd977ddd719f13ac6476a769abb1d8262927402e69f627577358d1577f43021aedb2165efcba126a14ffb8a3
-
Filesize
5KB
MD521ec8a121e699bab00a106573b0c1db2
SHA1f16c0d1c21115bb84a3227c296ca0f240b2b204e
SHA256ef183bf2c23993560ff5eb5585026049a683ac551fb136418a55298c7f0dcdff
SHA512f32088a9a1b3842c3c670e598942d714c81bf998268577fe077916142909eab1e1167deda057ab5f522081f7184b3c81865a1dfc89752654a3817feddcbbdcec
-
Filesize
6KB
MD5a6b51c8b3b49013923bd7c2d0de85f51
SHA1960547a802a52097d9d915da03ddd89f740aca14
SHA2560c40c504f3461dc8d9b1f4f5be22d45818d2b38658561a1b514156d091623f25
SHA5129013a36922b3291a18b89d1490eebfdc3a8d4742ed19ad71c4e5017dbf229305ae0bdb6b9a717762eedf509f126e393b2baa70d7c32462907554f2687c1ac426
-
Filesize
1KB
MD5de8949d611e1eb6db4e34f0c69900823
SHA177ebdc387d6bf5114e450b8b454b525a29325b3a
SHA256969adcfd2064136270c4cd871d7260593bdb90700ee5293ec6003148bd6fcba6
SHA512224136500114bd9b8eba9aca875c8dee2e63553015a511df5d8e7448c719b4596f2a3f322dcfcbc14413f9e20a387fd51e3b33c5c64d503874c7e6c779d4f858
-
Filesize
1KB
MD52ad09c2c79c03a621f56cbb3dbb6c4bd
SHA1df51ba47f8cdd210e6ed9ab48ba4d1b221d711dc
SHA2567c81d509fa722cf9c5a903d76cea6d09f53a00a8a7ba7107c7b80a600c9ebff9
SHA5121ec228c57232131955f6e63f643bf8eb83b93a4a96e1216d53df94be9f1e8b71f4da7ad1cdecc9f78a4a6ad902c66bd7842b6426d966ef014f963d4d6f4fb192
-
Filesize
1KB
MD5f35e0e7cafeb963df00ee849fa45e5f2
SHA1d249e44d832a9a0c7556bcd1952de12c95597c43
SHA2561a3fd921f3b415f04535fe31c7d6ff85b3a984670dd8793b707e3f9e80de85d1
SHA5121bcd3fa6feec999007d41e1122bce791c6b6dd35937e0f66a04a9540a167f2282d9dc645feb0ca81a521be7fc481ec56942773f9ecf9c8c8d39ef4b5b74fcd77
-
Filesize
1KB
MD5d1cb0ded42b0f519a63639341092d57e
SHA1361b177a662125da2ba2d5c030ffa2b25d47c2e8
SHA256b5978e8fff981534ded6d6aa71a607f2231bc2a8f812ad373976df2e7d09b554
SHA5128b4fe2b4e19cf57cee0d004d41b1acb9e39b662c465148ab2c663bcb0b5904ed1b03dc4e4425c29ac284752ee4ca4b143facd00fd4351445d2a97bd8d802a2b3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD527a99ac551ceb88e1012c8822015c383
SHA1c3dc6dfe61cd16e290fa9b22a64f681dca0bdfde
SHA25621f7e11a1b6f75a224d0fd7c3777bd49dba7a5c20bf60cc70a8d7b5598f81685
SHA512df46c4f09afdb09d344ea0a4daa24703e0cbf96b5e084bcb8e7f5bcd3e1bdaf694af5fa80299b0930a19c60f3ab8a100fe4375a0b10aa1875cf76d0b54b1f666