Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 08:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tinyurl.com/POaccept
Resource
win10v2004-20240508-en
General
-
Target
https://tinyurl.com/POaccept
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133620494446134869" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 240 chrome.exe 240 chrome.exe 3312 chrome.exe 3312 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 240 chrome.exe 240 chrome.exe 240 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe Token: SeShutdownPrivilege 240 chrome.exe Token: SeCreatePagefilePrivilege 240 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe 240 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 240 wrote to memory of 4872 240 chrome.exe 82 PID 240 wrote to memory of 4872 240 chrome.exe 82 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 4476 240 chrome.exe 83 PID 240 wrote to memory of 1900 240 chrome.exe 84 PID 240 wrote to memory of 1900 240 chrome.exe 84 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85 PID 240 wrote to memory of 2416 240 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://tinyurl.com/POaccept1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xd8,0x100,0x104,0xe4,0x108,0x7ffb263eab58,0x7ffb263eab68,0x7ffb263eab782⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1888,i,16847601034635616945,18314982149970808383,131072 /prefetch:22⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1888,i,16847601034635616945,18314982149970808383,131072 /prefetch:82⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2204 --field-trial-handle=1888,i,16847601034635616945,18314982149970808383,131072 /prefetch:82⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1888,i,16847601034635616945,18314982149970808383,131072 /prefetch:12⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1888,i,16847601034635616945,18314982149970808383,131072 /prefetch:12⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3904 --field-trial-handle=1888,i,16847601034635616945,18314982149970808383,131072 /prefetch:12⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3372 --field-trial-handle=1888,i,16847601034635616945,18314982149970808383,131072 /prefetch:82⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 --field-trial-handle=1888,i,16847601034635616945,18314982149970808383,131072 /prefetch:82⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=212 --field-trial-handle=1888,i,16847601034635616945,18314982149970808383,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3312
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\4dfaceae-25bf-4ca3-a1be-207357ce4a5b.tmp
Filesize7KB
MD5f67c03a03cc2cda69f62547a2cdd7e6e
SHA1bfb249278b031fc2f61cd66b5fe185fda08881c8
SHA256bf65f1d777047d1459222faf455fdcf6ea3d609dbb9e65ffdc09e5b22ada04e9
SHA512e8d9a521e898925fd2d381170936d1ac34551cc248399ca6aeb7ceb330c96befca472645f84ca543ce8d50cfc48a7648a1ba9dfab4d8ee48bf919726891949d6
-
Filesize
336B
MD5ea064bcf30d47b6db3ba5ea0f1d61721
SHA16bd02606268ced54058e2c2ad3c06df9ddea39cd
SHA256a6eaa1eb97c3241377d2a91eb83eff773174d6762e1119b54dff32c67cdc6e37
SHA5129ddbc14f7dc5b4512b90d8834ae47e72aa246802fc1c357a72f021ec1934c4a92665b6dcd993894d81a2c70067f1a3ec62252e44c23d17add83d991871a652e5
-
Filesize
2KB
MD57150a250ac0b5443aed5db92889750cb
SHA197fe38417c11aade67d80a5b9928ead92167433c
SHA256c8b36ddc91eb07d4186412fd17b1e6442cdc80f4a3ef6303909c7433134e0285
SHA5126ab7eb75a79ebde4efde999c11d2a2e2b4cded0ef762bf3a17003186a9182f0fb1c00e82771137740f61226eb537bd9ce5f5487804994b52831dc4ccc9232ddd
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD55e6616af616e64ca969bc72e53b46808
SHA1083f0502ce4db41bf8f838b9b93771b7fef4b33a
SHA2563fbc1671677994107ebbe5709b539c8a5567e4c9362505eb1c25c351536eba5d
SHA512a03b30fb25a182eb94a02ee9f03ef15508f521a79944edfc593c8fce49950435211293522081639ef815c376cb9587afb94f7bba8ec6ce3b42425e67315f65cb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\c67a00d9d1fe43239f2bf49bebc287eb867542bc\aa6f6af8-8aac-43e0-bbd8-b671ce2b0b4b\index-dir\the-real-index
Filesize72B
MD559897cead7196c6a8f7afa11ec3f4d1e
SHA1d8d56ab1163314f58203d49189b87e8a889a8982
SHA2561d5842355f985c30737c3d4422939e6f47ea542e2f29ab1de05406c345abbf61
SHA512db9c7be90be7f6f6a8c12d76f7b89ad368bc2cf06351ed116010833c8ee8db4a05f840720acc5147d6e10a5ad14ee678e9a9cd816abccae42c9791c8e590f48d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\c67a00d9d1fe43239f2bf49bebc287eb867542bc\aa6f6af8-8aac-43e0-bbd8-b671ce2b0b4b\index-dir\the-real-index~RFe57c544.TMP
Filesize48B
MD5eb64f39bd903d2ba422974eb9092449f
SHA164a0ebc26faa0555d526b5517ef837a4e5e43e62
SHA256ac9ab6494df4e9633ec811780db9987bd64cb686a8134f52407a77d17e278b1e
SHA5123d4d7c63fb25522735d6a98380e8148aa4e86accd0d260c6b50bd9d930ffd69e863ac5a17d9bb158f39c7be285291d864baabdbe8495a0cce31cd3d799e48d01
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\c67a00d9d1fe43239f2bf49bebc287eb867542bc\index.txt
Filesize117B
MD58e23b9ede0a371e6865513b0854e6dec
SHA1bf21179f02c796fe464afe950aceb4291c600b91
SHA256f5585040b00d9cd35981b355b1707a0bae32a5f37415aeed1829e7edebc7a78a
SHA512308b8c7977e48bf681ffe1f8c34ac19c040c59bd5e26485634d61b10b619947d24630c2f5a5c492c2862b9d4dcabf90ccda59d619ce6c498609491df8ef2033f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\c67a00d9d1fe43239f2bf49bebc287eb867542bc\index.txt~RFe57c573.TMP
Filesize123B
MD5bcd3562ea25d8bdd624306e277c1da29
SHA19a6179e823b7addfd295933a23b305c557f4f8ef
SHA256ece3f64b8e2d9c1dad1eb14236903879b92917114e441512799e0151c98aade2
SHA5123e5f73987ac35ba6cd652046fc7efd2278bef93895a7acaadb14eacef762e7a7c38f237dda9c0e8da6b36a8ff1f96a837ce4fd91cf6a543b09d9574bb0224848
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5d90978dcac74c76137e2d302b8c7666b
SHA168a7bfcfdc0d8797f02dc21670dc8a5ca52b2e6e
SHA256a0c1b98946df1d454508f757e72c774493e750adc7cda65a780c305decce97ce
SHA5127e9bf0ae5ecc7dbc16ffa609356eb4194b1b4b75a5cf7a8159dda4615174f861c55817d729fe3acd82353b1d3c6a8e92dd0eb98be3b499cdfcde5feaff6d437a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57c4f6.TMP
Filesize48B
MD5d92dd95171a91022d2820dd8e9e3fab9
SHA10f596754f3e76370bb644997728a9832571779e3
SHA25685da8f835bb40854b5ceccfb5bcbd121b00f31b66cf6af766542f9009aeee4b3
SHA51248ff6d398a4d26b2b9eb369673aea0e737862c708f4241fcb09d0c981abc4e90082e29f60f1adf07942e6698000121efce3c13ce66792ba62f4421867825e6cf
-
Filesize
129KB
MD56ca7bf23397df8a95442a775292aa3e8
SHA1449b9e6672abc191d40f8529ba89bf7c0b8af28c
SHA256b1d8367aa3f5ddd76b9b632065d9ae47e36b4db3676203763064d3db04593615
SHA512e1dfe5f4296a997d9dbad1b3223b970a703655b0941207d12d5be59e5476e9701f6c81fe4e227cbb04dd8e6e943e2549014fc22c6fd22a95e7c3122eaf5929c9