Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2023, 01:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://NjAOaDmE.net/RkdUeWo2TTh2OEE2NWRTSlFxdFFCQlZXdTR2RnI3SmU3= bGpGV3pLQkhNelZlYVJGOXU4ZnIzeDhIVGxFZ1RaVFpKNGQxRXBHYlJIQTBKT243dGQ3WEhwWDh= 3QTFCclBYOTNDQnppT1ZZL0k9
Resource
win10v2004-20231020-en
General
-
Target
http://NjAOaDmE.net/RkdUeWo2TTh2OEE2NWRTSlFxdFFCQlZXdTR2RnI3SmU3= bGpGV3pLQkhNelZlYVJGOXU4ZnIzeDhIVGxFZ1RaVFpKNGQxRXBHYlJIQTBKT243dGQ3WEhwWDh= 3QTFCclBYOTNDQnppT1ZZL0k9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 832 msedge.exe 832 msedge.exe 2512 msedge.exe 2512 msedge.exe 1828 identity_helper.exe 1828 identity_helper.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 832 wrote to memory of 808 832 msedge.exe 56 PID 832 wrote to memory of 808 832 msedge.exe 56 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 1852 832 msedge.exe 86 PID 832 wrote to memory of 2512 832 msedge.exe 84 PID 832 wrote to memory of 2512 832 msedge.exe 84 PID 832 wrote to memory of 4796 832 msedge.exe 85 PID 832 wrote to memory of 4796 832 msedge.exe 85 PID 832 wrote to memory of 4796 832 msedge.exe 85 PID 832 wrote to memory of 4796 832 msedge.exe 85 PID 832 wrote to memory of 4796 832 msedge.exe 85 PID 832 wrote to memory of 4796 832 msedge.exe 85 PID 832 wrote to memory of 4796 832 msedge.exe 85 PID 832 wrote to memory of 4796 832 msedge.exe 85 PID 832 wrote to memory of 4796 832 msedge.exe 85 PID 832 wrote to memory of 4796 832 msedge.exe 85 PID 832 wrote to memory of 4796 832 msedge.exe 85 PID 832 wrote to memory of 4796 832 msedge.exe 85 PID 832 wrote to memory of 4796 832 msedge.exe 85 PID 832 wrote to memory of 4796 832 msedge.exe 85 PID 832 wrote to memory of 4796 832 msedge.exe 85 PID 832 wrote to memory of 4796 832 msedge.exe 85 PID 832 wrote to memory of 4796 832 msedge.exe 85 PID 832 wrote to memory of 4796 832 msedge.exe 85 PID 832 wrote to memory of 4796 832 msedge.exe 85 PID 832 wrote to memory of 4796 832 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://NjAOaDmE.net/RkdUeWo2TTh2OEE2NWRTSlFxdFFCQlZXdTR2RnI3SmU3= bGpGV3pLQkhNelZlYVJGOXU4ZnIzeDhIVGxFZ1RaVFpKNGQxRXBHYlJIQTBKT243dGQ3WEhwWDh= 3QTFCclBYOTNDQnppT1ZZL0k91⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffb8546f8,0x7ffffb854708,0x7ffffb8547182⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,2457235961601770963,15810143939045450706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,2457235961601770963,15810143939045450706,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,2457235961601770963,15810143939045450706,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,2457235961601770963,15810143939045450706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,2457235961601770963,15810143939045450706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,2457235961601770963,15810143939045450706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,2457235961601770963,15810143939045450706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,2457235961601770963,15810143939045450706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,2457235961601770963,15810143939045450706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,2457235961601770963,15810143939045450706,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,2457235961601770963,15810143939045450706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,2457235961601770963,15810143939045450706,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3836 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,2457235961601770963,15810143939045450706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,2457235961601770963,15810143939045450706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3604 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,2457235961601770963,15810143939045450706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,2457235961601770963,15810143939045450706,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3172
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD514f3c541155c1367af1d244798036862
SHA1c4ad3d8e846715478bb8f4498ce339f2238f9406
SHA256bfba3b1192c6bacebfe6e533384905ab3e85c9acb6f8cc0bd7a52c6256938dc1
SHA5121e364e998a62a8317c9cfe1d3b1ba24907af3586053624aaf3948feb557f10b6363682d6cb789791cb59a9f7c207426f2c0ca4dc072fc9ab2e48ab54985a87c5
-
Filesize
5KB
MD50de7992b47ab1233a99ea6c362139ae4
SHA13972f91e7f8dc98026ecf1d960909961dc90c9db
SHA25634967fc1abe698115513aa82f79987f458ee658c61f86b47a586dd8ab6ec62cc
SHA5121f3e1537460219887150446f7813848d45e2c660eaf50958532a76ed0836d8b7fe4e0d5b7710121df8b729a4936c6b0dbbc5e317ec3461bdfece8d9b4c029609
-
Filesize
5KB
MD56c87b0890f85cd0480ca291f5601fdcc
SHA1694a556808b5548212d6d915a3eec00dda1ca75f
SHA2569a2706d8a6b4355a3d66695036f2779108ddc5c81516c212abe9a9d95ae63e10
SHA512a5d7c2dff29086dfbfb221ff7f2fda391fd786c0a05f9b27cf81e70e2c532314155fd85be191b73e8718efc6812b5256fe917d72f286e80c4f44b9bf700d0d3f
-
Filesize
5KB
MD53ab3b433b1763e963e6d1c1866803520
SHA14cf15d98a628dbea6f1592786226affbf771c102
SHA256b5ad969ee80fdab69e5bcf6ebf864548947b548be774852a6212115773929b83
SHA5120318b192c3b5866b81737c30177c462f8a0b7f85afc660bc8e0e5d644c2837d85b097ce4043b63628fa3ad8c3ce5ddae20e3f420404cbd6c9ce25a9da31a6bd8
-
Filesize
24KB
MD5e05436aebb117e9919978ca32bbcefd9
SHA197b2af055317952ce42308ea69b82301320eb962
SHA256cc9bd0953e70356e31a957ad9a9b1926f5e2a9f6a297cdef303ac693a2a86b7f
SHA51211328e9514ffaa3c1eab84fae06595d75c8503bd5601adfd806182d46065752885a871b738439b356d1bb2c1ac71fc81e9d46bd2d0daa1b2ba0f40543bf952b9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5aa0da533914f24333913c1e36b19d4c2
SHA1702b779ead45f83f1be0198ac9b5930e970a39ce
SHA25693fac548f44fc0af50e2069460b20e536bd795b4e8ab3c590953ddcbd3f704d8
SHA51205057e2370ee5474717ce1ce299a54d7ff5db601624c78bdd4017b3f9a21c23b6bce793c307c7fd320ed5586a99ad037e5f7880e7d91272c69737d92059e97ad
-
Filesize
10KB
MD53e84e149f7e5797ff0c4b35d3e478765
SHA102b1923316657d3d0ccb065d7b703ce171378402
SHA256588b2bc0b764cc4ce75aa9ea3e4fffd9ea5ba55806172acb47d2a8674da35a05
SHA5125d3edd0889f5cadb5de2c18c90c9d8344fc5bef82e77d3ba40ab3dca667b7a3452c8014ec405fb9c263201a70bebf16d32b08829ddf033d180327d069005cd23