Analysis
-
max time kernel
300s -
max time network
293s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2023, 06:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://preferences.news.com.au/
Resource
win10v2004-20231023-en
General
-
Target
https://preferences.news.com.au/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133446753650414049" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 2548 chrome.exe 2548 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2900 wrote to memory of 1952 2900 chrome.exe 88 PID 2900 wrote to memory of 1952 2900 chrome.exe 88 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 4604 2900 chrome.exe 91 PID 2900 wrote to memory of 2768 2900 chrome.exe 92 PID 2900 wrote to memory of 2768 2900 chrome.exe 92 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93 PID 2900 wrote to memory of 1056 2900 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://preferences.news.com.au/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb97dc9758,0x7ffb97dc9768,0x7ffb97dc97782⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1872,i,9476696041682434244,6193038435182905118,131072 /prefetch:22⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1872,i,9476696041682434244,6193038435182905118,131072 /prefetch:82⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1872,i,9476696041682434244,6193038435182905118,131072 /prefetch:82⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2936 --field-trial-handle=1872,i,9476696041682434244,6193038435182905118,131072 /prefetch:12⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2976 --field-trial-handle=1872,i,9476696041682434244,6193038435182905118,131072 /prefetch:12⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4736 --field-trial-handle=1872,i,9476696041682434244,6193038435182905118,131072 /prefetch:12⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 --field-trial-handle=1872,i,9476696041682434244,6193038435182905118,131072 /prefetch:82⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1872,i,9476696041682434244,6193038435182905118,131072 /prefetch:82⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 --field-trial-handle=1872,i,9476696041682434244,6193038435182905118,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4964 --field-trial-handle=1872,i,9476696041682434244,6193038435182905118,131072 /prefetch:12⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5696 --field-trial-handle=1872,i,9476696041682434244,6193038435182905118,131072 /prefetch:12⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696B
MD5318c265db0fd731cb69c20852ae8df06
SHA178c17bacd46f04842274e5bcbd77f6c65bf8954c
SHA2566d5c299d35e3a6c45bb53b7bda99adfa64212c93ca1007371249cb9befe07742
SHA5124d3e8e510489466d5c5ed9fa855db92e9310620dbd220452cea4827623d6d389f228171ce096a307f8290b4498dadcf9251d30390b909e57b5fcc3fc95e1d974
-
Filesize
408B
MD5ffbc1be48e64e7a6fa226ea1cbbe1aee
SHA10afd343a2d8d75e15aaf5b86495fec77b207cd1e
SHA256b18cd5b00833b4f6b5a7437a3ca9c94ca4754bd9e5b90c27bfc79f83286318fd
SHA512984a9d0db81262d8105475200e4073f05290cd843013f17d3c98dc06393d4befba04a22f417c02b2e257e9cd6b25e99785e8303eaa9b8b7db8a77a4392daeab4
-
Filesize
4KB
MD54d90f62a07e917886bf1749d8c64f726
SHA19730cb6ff359ecfa94069e40ca653ab0f6785ff0
SHA256db0237d12c62e236571805a17666afc3e287c77de98bc982f83117dfe09eff0f
SHA5126ffebd43a168ecac8564d20ba02760c749277d2649fbd3efe751f5cc074d147469ec1e1ea21edc807603341063027404662777b61e7474541ddd195cc132f77c
-
Filesize
5KB
MD5ac06f612cb4bc5fa45e816ddb113aedc
SHA1d6fac27df7285d15c9bc6ac8c9549264fa3b4132
SHA25662b04e23cd19ff1a5b5ba074d414831081c88a855475d5b64e0c2fcdf4e5fc0d
SHA51202a586ad58e5595285daf8d3b71625c972875a34cf34e3013306cced41b30c91a63dcb09f75157e716761ed7b2a5ac9cd77de8634d89065f1bed72eba7de0324
-
Filesize
1KB
MD51ade31cfe03e6e62f9514a503a5cb4c0
SHA19ead7926004f340a7583c39a9eca1add28760aa0
SHA2564d5527da59164b20634638f0ca73cf9fb48173f5ab39db8184331996111039dc
SHA512be538f90ca6c40f14db15c5547a0bb274379770fc94e29f89f9c79f14a5ff5c6bcc9df675fd6cb488c917fe352155241f993575f4be5921b454943b83f6b9eb5
-
Filesize
1KB
MD505585033bf53c9d11d3417573b7e5728
SHA1dc1b68d5585d05440e87e8ce19782bf924b4812a
SHA256349868496b1bf6a3172d9200aa8197730e6cf18a16ac134170ad8a01d3f42895
SHA51213ed3201e35adfdd6327ab9d86082ce575740b790de1443cdc189fed4ab7218751333bb07126345de1a2b09a29646e0a07d6a6da03cae3b5fac8a950153df0aa
-
Filesize
6KB
MD5079a488f68e975dbd9718e56b0b6cc73
SHA1d416a9e807c30b2de6337718359935b1167241bd
SHA256e8ccf07d37c130c6798c752e8e88e6e4da4c9bca03536d14f1125288604b93cf
SHA512d61095e80f16d9ca8c851c656dbf4f1ba6a96330b4e6304bfc08a9592ddb4347dfaeff13f943c393aaec8909fdbce25ed69bee2aea9e9a40709d4458fa62c62d
-
Filesize
6KB
MD5d46c672c937c913eb60633df517fee8d
SHA17e0aae1b38bca0159f68e5fb9b04f7393e825104
SHA256563deb69bf4d1ea3e29f7b821d9f172267c73f91dbcdafc633a55c29291454ed
SHA5123e55fd68d6b4b5b96b27292bae4816deb07d9343317d43407491812b20e294f313f6e16861a51df3cab73a036f72716dd368481c8db0be12c6a0c9e1e94672c5
-
Filesize
6KB
MD507b9d4b031a24dde19377bc1acbebe9a
SHA12c9a437d53f496415470f89e12db96a7b94edb00
SHA256aaf0e96f821a319b69308c3be668c42f41640d44cb8b5f1079da6e54b9dc1395
SHA51273682e7f61f43e670655f59fb189cbf6f77a8c1bb7a96d736d084f1b851a590e53f4f3c8630eae3c3ad97ba3d54aa7369b59b8259dd10f4fe888125805ddcaea
-
Filesize
109KB
MD57279ff87aa7ae613a6ecfaabad4b086b
SHA1f8fb5a1234677a91aa96dd1912480d94ced56a36
SHA256060a6c05c710c5aec0fbed322a6d7ed0d8d877422bf452a7e6f8b9d3f8433e05
SHA5121c1bb7595f34104fcdd7796d08c74d7a1e66c13fa82b31c22545ecba456ab8965f12d2ee93d717cfc9ab7154ad4295ca480740fae512d8e42f12bef5cf3f1c93
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd