Analysis
-
max time kernel
53s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
17-10-2024 23:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://kpmgwebnotify.com
Resource
win10-20240611-en
General
-
Target
http://kpmgwebnotify.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133736805964078221" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2004 chrome.exe 2004 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2004 wrote to memory of 4564 2004 chrome.exe 71 PID 2004 wrote to memory of 4564 2004 chrome.exe 71 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 5084 2004 chrome.exe 73 PID 2004 wrote to memory of 896 2004 chrome.exe 74 PID 2004 wrote to memory of 896 2004 chrome.exe 74 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75 PID 2004 wrote to memory of 428 2004 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://kpmgwebnotify.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffcb8cb9758,0x7ffcb8cb9768,0x7ffcb8cb97782⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1816,i,3214282925566695971,15562399570608821040,131072 /prefetch:22⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1856 --field-trial-handle=1816,i,3214282925566695971,15562399570608821040,131072 /prefetch:82⤵PID:896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 --field-trial-handle=1816,i,3214282925566695971,15562399570608821040,131072 /prefetch:82⤵PID:428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2664 --field-trial-handle=1816,i,3214282925566695971,15562399570608821040,131072 /prefetch:12⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2676 --field-trial-handle=1816,i,3214282925566695971,15562399570608821040,131072 /prefetch:12⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3868 --field-trial-handle=1816,i,3214282925566695971,15562399570608821040,131072 /prefetch:12⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2800 --field-trial-handle=1816,i,3214282925566695971,15562399570608821040,131072 /prefetch:12⤵PID:364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4320 --field-trial-handle=1816,i,3214282925566695971,15562399570608821040,131072 /prefetch:82⤵PID:3900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3996 --field-trial-handle=1816,i,3214282925566695971,15562399570608821040,131072 /prefetch:82⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3636 --field-trial-handle=1816,i,3214282925566695971,15562399570608821040,131072 /prefetch:12⤵PID:96
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2884 --field-trial-handle=1816,i,3214282925566695971,15562399570608821040,131072 /prefetch:12⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4440 --field-trial-handle=1816,i,3214282925566695971,15562399570608821040,131072 /prefetch:12⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4344 --field-trial-handle=1816,i,3214282925566695971,15562399570608821040,131072 /prefetch:12⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3976 --field-trial-handle=1816,i,3214282925566695971,15562399570608821040,131072 /prefetch:12⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3932 --field-trial-handle=1816,i,3214282925566695971,15562399570608821040,131072 /prefetch:12⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4004 --field-trial-handle=1816,i,3214282925566695971,15562399570608821040,131072 /prefetch:12⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 --field-trial-handle=1816,i,3214282925566695971,15562399570608821040,131072 /prefetch:82⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3948 --field-trial-handle=1816,i,3214282925566695971,15562399570608821040,131072 /prefetch:82⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=848 --field-trial-handle=1816,i,3214282925566695971,15562399570608821040,131072 /prefetch:12⤵PID:4172
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD576cfb02af977061f80698726e2a7b73e
SHA1f48b5313b03f3079cc6f9c855c7bcd299f078559
SHA25606896919558d5ee410a6ea7792f915b40107d04f2f5fba7018a252c3f904ab5b
SHA512ba681d800a5f42d60951e92737aa50d2d2528d6cf035c2688311c221e6bb6a4f3f41f968da602430cacd8182e4e2d64cd16d34dda9522743fc9de65f3ab193d0
-
Filesize
5KB
MD539eb62401c246d08d346c716be0ea6c8
SHA129dfeca48740ef8cde9fff5158016e7909101bc9
SHA256e7dbc3b88355f94452702703f8124e1b2e3dc312aba0897b849b4570344ca38b
SHA512949d1eb69e3697db365f650fe073bbf5e3ff44e4046d453418c2114ccd66b2d54d6ef40735a0cf764995c11bfbcc3192e11cf605eb41610a22460102faf73f6a
-
Filesize
150KB
MD51894ffdfd0f399af8ce37c69c3db2c24
SHA129353cfe8586ac2c6442546b9634ea6db98572fe
SHA2567cfc189c9a11e2f8a5f3ab92ab2095c6da13404161576664e66d151aefe8de3d
SHA512e5ffbe34ae2a9269cb0f7480d8c8b2f10a5d36c4e2ac0f7269dc91e2aed9206a2c4f978d6210c91381637ccf993f4b77c857a6258350885db547322a253c3fd2
-
Filesize
150KB
MD5823ce10def682ebe722ac89c592d7d8f
SHA1e354bd4d94b29fdcde598fc0ff1c26fa4dcc475f
SHA256db0b67608090b126333130370ee126a06f54da70bd009d3c7c915ed5dba1a705
SHA51281475e8d39e516be6619485250574ea152448920b7254931073709a0cd4bdd4ceddf347f035ed2e2d4ac10eb9b065c1999ccbcfbe951336b63eb2b5bd5c2d5f4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd