Resubmissions
14-06-2024 20:25
240614-y7qwasvbqb 114-06-2024 20:24
240614-y6qtxaybqm 114-06-2024 20:22
240614-y5qshsybmk 114-06-2024 19:07
240614-xsw84asepf 8Analysis
-
max time kernel
599s -
max time network
564s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 20:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.dentistrytoday.com
Resource
win10v2004-20240508-en
General
-
Target
http://www.dentistrytoday.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133628728889757691" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 5060 chrome.exe 5060 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe Token: SeShutdownPrivilege 3156 chrome.exe Token: SeCreatePagefilePrivilege 3156 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3156 wrote to memory of 1344 3156 chrome.exe 81 PID 3156 wrote to memory of 1344 3156 chrome.exe 81 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 2660 3156 chrome.exe 82 PID 3156 wrote to memory of 1512 3156 chrome.exe 83 PID 3156 wrote to memory of 1512 3156 chrome.exe 83 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84 PID 3156 wrote to memory of 720 3156 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.dentistrytoday.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6b7cab58,0x7ffd6b7cab68,0x7ffd6b7cab782⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1924,i,675078711585296547,14673555524844101490,131072 /prefetch:22⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1924,i,675078711585296547,14673555524844101490,131072 /prefetch:82⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2248 --field-trial-handle=1924,i,675078711585296547,14673555524844101490,131072 /prefetch:82⤵PID:720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=1924,i,675078711585296547,14673555524844101490,131072 /prefetch:12⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2876 --field-trial-handle=1924,i,675078711585296547,14673555524844101490,131072 /prefetch:12⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4680 --field-trial-handle=1924,i,675078711585296547,14673555524844101490,131072 /prefetch:82⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4032 --field-trial-handle=1924,i,675078711585296547,14673555524844101490,131072 /prefetch:82⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5112 --field-trial-handle=1924,i,675078711585296547,14673555524844101490,131072 /prefetch:12⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4812 --field-trial-handle=1924,i,675078711585296547,14673555524844101490,131072 /prefetch:12⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3120 --field-trial-handle=1924,i,675078711585296547,14673555524844101490,131072 /prefetch:82⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3220 --field-trial-handle=1924,i,675078711585296547,14673555524844101490,131072 /prefetch:82⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 --field-trial-handle=1924,i,675078711585296547,14673555524844101490,131072 /prefetch:82⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3988 --field-trial-handle=1924,i,675078711585296547,14673555524844101490,131072 /prefetch:12⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1548 --field-trial-handle=1924,i,675078711585296547,14673555524844101490,131072 /prefetch:12⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2320 --field-trial-handle=1924,i,675078711585296547,14673555524844101490,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5064 --field-trial-handle=1924,i,675078711585296547,14673555524844101490,131072 /prefetch:12⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=2320 --field-trial-handle=1924,i,675078711585296547,14673555524844101490,131072 /prefetch:12⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5638dc0c7ee680b4dd32aebff62cd0c30
SHA1f35b8a870e162094052949cc10c72eba13d27389
SHA256aec4c1409f250b2c9a792b4b9e3b658e4d25aebfff67759b4f47cb269cb448be
SHA51209d67757f5e25e785aa9f9e8b719fa044a69d9985d5914696e1a22c9efbdfc077d0396357cb87b8135cb4ca50a898d7e6dbe3a220020275bb8241c34e468ca1c
-
Filesize
257KB
MD5356a2e23ade11b1dc04e6e2407365424
SHA1561cc600689054c3bab7f86ca0ec97dec2ca90f4
SHA25683910d83669934a48dbf51b5b37c33efae6ec0b22c86c94ccf8e2feffe941701
SHA512dd3e247fbc8ac659936b2ccf87cddcba2b8cd28d2109d3ce6e0c8d37774f46f1df8cc03647910be38ddfd623721c109e24d6f0f4a5140c5608e7da92913e5ad5
-
Filesize
257KB
MD5580e1ba0c8b4ab214055490d4e951cac
SHA19cc47642c4555486a1a35a7ffe98210f1b99259a
SHA256036ade38bd4e91c80b9482ecdde9fc310fc1555ada49cba888ec344f305978ff
SHA512aa4ee3ed8a2bc8573338b3c6c20d582db8b6731254854462185a3de77bf727442817b733dc09756a8eba0d7449b4ba0fea65c9e7acdb38ae75338ec7fea2ccd7
-
Filesize
91KB
MD5009a1d4e06e977d45fed870d87067d06
SHA1db13d81a383c0d58f1e1ba57c011a8598e5fccae
SHA25684b9c81a95fc5420c3e60a8cc8490c14176ac7633d1beb16d9fdf11209b8c6e3
SHA5120ea8741de7be2e594825bf691fa531401877a3f5a9fa3e55c21c162d9bbc15b9326c86b05862a8d15b291b4562e1aedcc241b5554c9e6ec2fba78b390105eca2
-
Filesize
88KB
MD52830067c771daacea28c4baffe91ac7f
SHA12a0d98bd98cca301846df0e590872d9cb15df399
SHA256e704abaa275fc356e7e78a84b673b9c367cf778978c3639bc0c9a03c14d58ecb
SHA512f05e3a41625bbbde7f883c53264e1ee9f563ff494f8b3db57f43820124afc1a4bf415265edffec14a7fb1ffad0d56e071e0f6a4fa0e914d50dc5fc750485eaa7