Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 00:47
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133771420533005122" chrome.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 384 chrome.exe 384 chrome.exe 384 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe 1416 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 384 chrome.exe 384 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 384 wrote to memory of 3620 384 chrome.exe 82 PID 384 wrote to memory of 3620 384 chrome.exe 82 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 3564 384 chrome.exe 83 PID 384 wrote to memory of 4308 384 chrome.exe 84 PID 384 wrote to memory of 4308 384 chrome.exe 84 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85 PID 384 wrote to memory of 1348 384 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://0416c34.netsolhost.com/microsoft-outlook/app/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd4,0x108,0x7ffb1713cc40,0x7ffb1713cc4c,0x7ffb1713cc582⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1964,i,112230988154619760,11746514220028511314,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1960 /prefetch:22⤵PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1940,i,112230988154619760,11746514220028511314,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1996 /prefetch:32⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2232,i,112230988154619760,11746514220028511314,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2272 /prefetch:82⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,112230988154619760,11746514220028511314,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3112,i,112230988154619760,11746514220028511314,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4572,i,112230988154619760,11746514220028511314,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4580 /prefetch:82⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4816,i,112230988154619760,11746514220028511314,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5ea189b4812b56f856925dd9efacbfe7c
SHA109ee5a71b68b77df50b1f68025088ff1b74a106d
SHA25622e4daa7439fdcf443db5aa5ea3cedcf64cce3aaf705bbd08da7a4acf033a580
SHA5125958d521956ff0f32cab998542795a4521995edc42da1ab2385433cd2ddd88a431c54989f79a3de89c0d89bf9deb309a37933bb25b32913834dc366b3e678477
-
Filesize
1KB
MD5914ef0cb66864c057a724e4d2cd9aa19
SHA10c1373fb63fc7c9c0ae433e84f3fcdcbbab6438c
SHA256286a70a44453226c8ed01048468fe64410159849630503607dd6c1eb4b40f12e
SHA5127ca2877e2b884aaccff8d11f4e0e111a3017da27af9e4edd8d164e6493fd4c56c187628714a8b52641be97a5773ff70cafe34cbf6f29a816f1d3d0aa3f1403ec
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
522B
MD54466e11c8ba9adf49296f80315089295
SHA1f332ab31527629833fc393b685fb78cdcfd412ec
SHA256a96e447ce345032b8a6df96d954705be89967885e38d0d58e9cd8de7972bf51f
SHA5126550663d2c9fc4884c4f238d7a44737b4f7f95bb7c82698d21df7b220f61588b3b3305a6d6f7e38bf17a728804ba43546b63f22bf5155351766f8196843da866
-
Filesize
9KB
MD52ebbf45716d0b1d5d733cb0b47c21348
SHA1b95a3889f246c845373fd6ee19387d98f5ef9f84
SHA2562f6f20a9c0bedd790de38a320fd4cb4353760fda07a18ab48ed6c586ee4c8c1c
SHA5124a6d54aab8e14755103ee0b68965865627d6ff7ab4c86e4b3ba99b1c78b90dd7ae111d5d66435904e81d72fc6a323cdae40d42b86a329840187cfc064be31287
-
Filesize
9KB
MD57c2472af4e29f0d8d3b3f6d5c7ae8c98
SHA10c209dda9145f0589c6fdaeebaf0dacc71fe89a1
SHA256a224c91870706b617fd4608da66a840a8d0a9a15300cf9f24293d98805e917c4
SHA51280bab15c0bcf8611f852539cd38af049c2fa23c1be06b2302d1cf007cf6335efa34ec863a34a38c4dc01c6de540b9b1d42e14794d6745eefb1a89b42dc702d51
-
Filesize
9KB
MD5fd9c3e980a8be7c0c7d5b0c92652d943
SHA18a131ba9466363977554286d9b123e352c497e17
SHA256fd8e22971e946a4b2c10ef3a4ef12e32022e7de920e6d14d6b47d222710788a5
SHA512553003cfeecd3519fb63bdb198ce2baf514293a0bad9e8fb9be0cc0fb8a7c493011330133bfc96832ca3b90b9dfd427ca816518c592bfafdaf70477d301f864a
-
Filesize
9KB
MD54281d70648e234bcef47a9b1416558c1
SHA1778dd111c8d6fd5a3d4c6d619f7bec224e8c6ac6
SHA2560da7b63ccf0fbdbbf7bd0bcc4ecac8cf98aaadbf1b61e4ecbbc2d0c6692c5c48
SHA512bbc4acd7faa53555ebe47596f0f75257508b1a7f99f65152ffc528140aa2afc741cd81ba33e76bfe61a9c45a9c79dffa486038f74418c4d94250ffca670ff2da
-
Filesize
9KB
MD577b10970b4d70b3ce9d3a11779cab6a7
SHA1263ea6518b08868a49ea50ae8a68f7eb9eae20ee
SHA256709a03ebc3ab68b30ae10c7cf5a69b27741560ee9a0b8a536be2c75143ae993d
SHA5123cae1a7fecd4a3732291b9cecbecd5922d72fbf35b4923824ab71913fbabef62dabdb35fec5fde239acd022c45f94b539c2f0713140fca9a8444ffecd39c20da
-
Filesize
9KB
MD5bb81d5cf05f119288301903ea19409b6
SHA18eb5835a8d492bc7998d37964f671299a2c61e20
SHA2565563b09ffca2e42e0c1859291fa7a881771fdc4a3d96d012ad10cb7df63f4d97
SHA51278bcde4f2a137d4254d93bd9eca590d929c2d2200f164a2e2796cc3520e5f9418cf864d01b935b496ec5b6417932773bc8c676fcba4efb55f2fe18000c7646b0
-
Filesize
9KB
MD5c6e442c51d6f1871eca3fe057d6d22f6
SHA10ad93d02a931cc6f512934b6da312a7c501fdea2
SHA25613a8f231152b2ca6364a5d1b3f0dc7abfc93595b644d352d35c0a7ece2f3c4cb
SHA512c0b992576d3f469419a9ee84bb020d97082942e058e8dad572baee88e24ad7f6e01d94b99796d71b5a4088e5b704050806ab9545a239e60808d54d5135ab2fc7
-
Filesize
9KB
MD52242be015fc908123029f7eab905451d
SHA1bd914e6de2c81c96d95c07d1f9aec87545c39ac7
SHA2560e03b14da3a7889b7c6482e01b2392c8242a31d812271030689c3edbe50612eb
SHA5126db9210be14e35c36bd02770f36bff7a20b1ecb83f82a48573ac6fb9db4926884fbd405f1aeab1d88fd5d667fca7dccbd7ae6abcf13acabb1e32710377b55c81
-
Filesize
9KB
MD52b228253ed3043fbb0ad8f0674d89d20
SHA14115ea9468cf4b7f20755c274689138f977354d0
SHA25660f6b326c7aa71aa5e1a87ee796e964f3a900ce0ba63b890addf79a95213c049
SHA5120a5417d93af6dd7c58df44eef88896d07b5c2bdaf7b1d5d10a2a8c383fcbadcf55043dd08145d82efae0d2a759a88463dd3bf0e4524735f267358056bc9279eb
-
Filesize
9KB
MD58cb0bbcd38ef00bca9e3c7dc890a966e
SHA1cbeb32ed740af3cc5301f12b2e950949650a8add
SHA25687b181a79e138682bbd32196844d67be6269f35dfaa5612b76c7f658cd727c8a
SHA5126cd78cf19994424a5716763cc87ddc72ba34a0b3b3903ce2743e6844037fb69d444133a5727d3c90de7b8fa73b866c145000865cfdd3c79d1e899bd27d5be439
-
Filesize
116KB
MD5c3c444041307dd78e851f854a29e3e4e
SHA195ae2672e61ae080f7ba1ba8ae6d6e5f6a6e2b45
SHA25631a5d779a86f1d2eb96cf828da3ba877212b73a7d1d8ee87a7b10b661e27fadb
SHA51253abbd750ff42a1c242d5fc482bc8ce0223df36cdd956f746e6724baededa0aac45a85b74608557c114c124336f96fec1a6e42c34366b1d22f4c45b61d72343a
-
Filesize
116KB
MD58bcadb101f2128375ef140dd69004bde
SHA14038871400b761f3729432a7f61f8e86e4371eaa
SHA256fcaf991e9752c29cb3500e723c8c606cfa6f2f3a19c8fad864981c289f437809
SHA5127c4056173eff1b26a3996e93ef6ae09c3cb237327b6083eadcbf5b39474810c29f42c0688f74876a5c4863ab7dad73505f8250ac96f61e07f06b6b9eb3472c7b