Analysis
-
max time kernel
300s -
max time network
302s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-06-2024 19:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Endermanch/MalwareDatabase
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
https://github.com/Endermanch/MalwareDatabase
Resource
win11-20240611-en
General
-
Target
https://github.com/Endermanch/MalwareDatabase
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133641637672999694" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 2548 chrome.exe 2548 chrome.exe 2500 chrome.exe 2500 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 2548 chrome.exe 2548 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe Token: SeShutdownPrivilege 2548 chrome.exe Token: SeCreatePagefilePrivilege 2548 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe 2548 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2548 wrote to memory of 2356 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2356 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2744 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2184 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 2184 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe PID 2548 wrote to memory of 220 2548 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Endermanch/MalwareDatabase1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffd77c9758,0x7fffd77c9768,0x7fffd77c97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1816,i,3105168892632586503,6582876102387073085,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1816,i,3105168892632586503,6582876102387073085,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2160 --field-trial-handle=1816,i,3105168892632586503,6582876102387073085,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1816,i,3105168892632586503,6582876102387073085,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1816,i,3105168892632586503,6582876102387073085,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 --field-trial-handle=1816,i,3105168892632586503,6582876102387073085,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 --field-trial-handle=1816,i,3105168892632586503,6582876102387073085,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4616 --field-trial-handle=1816,i,3105168892632586503,6582876102387073085,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4088 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD5dfade21987287f6d83c9b8d78e4105fb
SHA1cb2c5333400739b227664e6e69226190990c819e
SHA2562799d0fc04b61673b9adbcb78ab5e74dead8ccbe8b9cf35515f76ec4abe7cb04
SHA51239eb07cae4383a1cb7726337a212624b5f9e8e1e09d24d446e05463cceaf4ac3e343fe4b7875c5b9263f43646ab1a3e8181bee116da1b583f31274eca100457d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5202b3d1574c7aadd56cc580a22773662
SHA1c23e40e8c14f237a8532f7730477b7b457e97b64
SHA25648caa9752452aa530624491503f387bafa857d2bac39824ac90119164ac38ccf
SHA512b6479c997817bc59b23475c1df44366f8963292f85cd29e9036c4f684eeb453695b5b5665a18cfc3e9da6c9d1cdb0539c3cf6b2b59df5b71008625ca0d0671ee
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD575b1cf1a240aae7ee35418c5d7e27458
SHA187b9273d0d640ae520f9c4484c88150764a0adce
SHA256deb6ec395577de83fef189465b17b39682e2aca97c53d4ec4ddd37974c861b8f
SHA51299da9bcec1d24b8fc29ed2f711dbce7cdefdab19c44b29e6a1e33c6d2e76f8f975d3cb82eb1856565ef48b7994fb318ec62dfd681b414c392c837e7e1902f227
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD55049e7503d997fe19392faddc6d9f31b
SHA102e8c57d3a2f6ec6aec85002716248649d517e18
SHA256a27212395521ed3dfef6d075d2877710be4a56ecc56dd98ccb7175b4ffcbf2cb
SHA512063092051075e73fc5c9d5cb2143d1fbf66f7abd2e0277a4842ec4f8e47ad3189f7b8ade9e929a0707058d4d0bf1139a61b3b23c6ee98988611f88d3a369c54c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5ffd74f60590cd4bf0f6c8fbdb29eebbc
SHA1a5520a9ea46ba8ba7e6b6623dca6a1c9f9daa151
SHA256195a61bd65ee30d951ad42471abc8ce7f138f3c21294175f8c6fc6d606bf6ecc
SHA512a2df64f675a10649188b84bfa1b3de1ad5d056cce122f79902dadc274859fec1c48a3a77aff28f81e7da5c4a0c42c469c779525ef39ddd26452e0298338e9f13
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD582551d14e44151df248a9e7043b1fe15
SHA154c73a8f6564951cb4c99cc025088b3cb3585d92
SHA25675c5dde7e16fac69d3682b8fcc223df75fd47972d3c6646bdbc2a27b95d45ca9
SHA5125c81f95a635510ca265ab19a66bc7a4bd0f21509e2baea0cc980afc4548d589f22ea828c5afafc57270a1a7da525f5f483e3a56797a28754e38a538433f3cb8b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5959bb891db1c65e80837e7b2b8177044
SHA122a4f286bbf7eb1c707ed6848dc0577acd83abb2
SHA25681e4e5f4463b919fd5084326f876cee2f6e8a882e6cc7f7a429451d0ef6c350f
SHA512597afa62351e80c5bfacdb6a5466a84937e24625991ed61a8bbeae33e39bba69696c1d91e23260b95ce65e24432cfabe964716c90d0748b4f9ef9f2d94a9ebda
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
128KB
MD5f3da1aa2f91e531a3a8680e838222bc5
SHA109813731827c8d087a871f5791f352c2f9e3bb3d
SHA25607da47b8dfb4776c15206ddd3b5f786d02d4bc5d8293eefaf368940a4253904b
SHA5125341183a6ddb4e732a41189b57d2394df5c7ee41dd6eb257d6641bd029a9c8a4e89212a1e3bcae83d8c659dcb1a2acde0d2cbe8eaa5a12a62591da315ccbccb8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_2548_QQRKDGUFQMSWJHZYMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e