Overview
overview
10Static
static
10VirusPack/...sc.vbs
windows11-21h2-x64
1VirusPack/...X.html
windows11-21h2-x64
4VirusPack/...sc.vbs
windows11-21h2-x64
1VirusPack/...st.exe
windows11-21h2-x64
3VirusPack/...sc.vbs
windows11-21h2-x64
1VirusPack/...t1.exe
windows11-21h2-x64
3VirusPack/...tub.js
windows11-21h2-x64
3VirusPack/...ub.exe
windows11-21h2-x64
7VirusPack/...og.vbs
windows11-21h2-x64
1VirusPack/...e2.vbs
windows11-21h2-x64
1VirusPack/...pt.vbs
windows11-21h2-x64
1VirusPack/...in.vbs
windows11-21h2-x64
1VirusPack/...ys.vbs
windows11-21h2-x64
1VirusPack/...e1.vbs
windows11-21h2-x64
1VirusPack/...ns.vbs
windows11-21h2-x64
1VirusPack/...on.vbs
windows11-21h2-x64
1VirusPack/...ne.vbs
windows11-21h2-x64
1VirusPack/...er.vbs
windows11-21h2-x64
1VirusPack/...C4.vbs
windows11-21h2-x64
1VirusPack/...PE.vbs
windows11-21h2-x64
1VirusPack/...l1.vbs
windows11-21h2-x64
1VirusPack/...sh.vbs
windows11-21h2-x64
1VirusPack/...e1.vbs
windows11-21h2-x64
1VirusPack/...sh.vbs
windows11-21h2-x64
1VirusPack/...C4.vbs
windows11-21h2-x64
1VirusPack/...ys.vbs
windows11-21h2-x64
1VirusPack/...Pe.vbs
windows11-21h2-x64
1VirusPack/...bf.vbs
windows11-21h2-x64
1VirusPack/...t.html
windows11-21h2-x64
4VirusPack/...me.exe
windows11-21h2-x64
3VirusPack/...n.html
windows11-21h2-x64
4VirusPack/...r.html
windows11-21h2-x64
4Analysis
-
max time kernel
900s -
max time network
869s -
platform
windows11-21h2_x64 -
resource
win11-20241007-fr -
resource tags
arch:x64arch:x86image:win11-20241007-frlocale:fr-fros:windows11-21h2-x64systemwindows -
submitted
18-01-2025 21:03
Behavioral task
behavioral1
Sample
VirusPack/Darkness.last.mod (2)/Darkness.last.mod/misc.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral2
Sample
VirusPack/Darkness.last.mod/Darkness.last.mod/Agent_X.html
Resource
win11-20241007-fr
Behavioral task
behavioral3
Sample
VirusPack/Darkness.last.mod/Darkness.last.mod/misc.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral4
Sample
VirusPack/Dbot.v3.1/MD5ChecksumTest.exe
Resource
win11-20241007-fr
Behavioral task
behavioral5
Sample
VirusPack/Dbot.v3.1/misc.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral6
Sample
VirusPack/Dwighlight_Stealer/Builder/Project1.exe
Resource
win11-20241007-fr
Behavioral task
behavioral7
Sample
VirusPack/Dwighlight_Stealer/Stub/Stub.js
Resource
win11-20241007-fr
Behavioral task
behavioral8
Sample
VirusPack/Dwighlight_Stealer/Stub/Stub.exe
Resource
win11-20241007-fr
Behavioral task
behavioral9
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Classes/cFileDialog.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral10
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Forms/Module2.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral11
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Forms/fDynastyCrypt.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral12
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Forms/frmLogin.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral13
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Forms/mLoginSys.vbs
Resource
win11-20241023-fr
Behavioral task
behavioral14
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Module1.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral15
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Modules/clsTrans.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral16
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Modules/mAddSection.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral17
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Modules/mFullClone.vbs
Resource
win11-20241023-fr
Behavioral task
behavioral18
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Modules/mIconChanger.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral19
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Modules/mRC4.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral20
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Modules/mRePE.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral21
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Trans/UserControl1.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral22
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/clsBlowfish.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral23
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Generator/Generated/Module1.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral24
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Generator/Generated/clsBlowfish.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral25
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Generator/mEncRC4.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral26
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Generator/mLoginSys.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral27
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Generator/mPe.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral28
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Generator/mStringObf.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral29
Sample
VirusPack/FBIRAT_Fuck_Hack_Hound/FBIClient/FBIClient.html
Resource
win11-20241007-fr
Behavioral task
behavioral30
Sample
VirusPack/FBIRAT_Fuck_Hack_Hound/FBIClient/Name.exe
Resource
win11-20241023-fr
Behavioral task
behavioral31
Sample
VirusPack/FBIRAT_Fuck_Hack_Hound/Injection/Injection.html
Resource
win11-20241023-fr
Behavioral task
behavioral32
Sample
VirusPack/FBIRAT_Fuck_Hack_Hound/Injection/Server/Server.html
Resource
win11-20241007-fr
General
-
Target
VirusPack/Darkness.last.mod/Darkness.last.mod/Agent_X.html
-
Size
6KB
-
MD5
efac5f4b81bd852573c25172c8f064fb
-
SHA1
d24ae2a39733ef06431399c768c54cae7232c2d3
-
SHA256
e193f03f109b2079b0d3ecc9a05a24b9b4e4c9d9eadc4d7c20c5a623ab463467
-
SHA512
30d1c43f6a6bfc1f68f1689242f9e67efeb7ed623ec18c41563d7e4494f4a58c7ff13e9e8ef8da80bafeaf8163a0ff0bbc2f55f16bb385ebdb4583ed3266435c
-
SSDEEP
96:sV4FEM6Y2/CNgyCGUF0zL9knkOQVWJdDJkI4JUdPIsizxNpcqHctReL3OHlzTFC1:sV9RGCqqkc7zHu
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\INF\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133817081167728267" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3564 chrome.exe 3564 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3564 chrome.exe 3564 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe Token: SeShutdownPrivilege 3564 chrome.exe Token: SeCreatePagefilePrivilege 3564 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe 3564 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3564 wrote to memory of 5088 3564 chrome.exe 77 PID 3564 wrote to memory of 5088 3564 chrome.exe 77 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 1832 3564 chrome.exe 78 PID 3564 wrote to memory of 416 3564 chrome.exe 79 PID 3564 wrote to memory of 416 3564 chrome.exe 79 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80 PID 3564 wrote to memory of 3836 3564 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\VirusPack\Darkness.last.mod\Darkness.last.mod\Agent_X.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a07fcc40,0x7ff9a07fcc4c,0x7ff9a07fcc582⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1824,i,8333903176404520634,11280398842298351599,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1820 /prefetch:22⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2040,i,8333903176404520634,11280398842298351599,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2088 /prefetch:32⤵PID:416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2180,i,8333903176404520634,11280398842298351599,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2108 /prefetch:82⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,8333903176404520634,11280398842298351599,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3096 /prefetch:12⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3100,i,8333903176404520634,11280398842298351599,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4472,i,8333903176404520634,11280398842298351599,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4484 /prefetch:82⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4488,i,8333903176404520634,11280398842298351599,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4732 /prefetch:82⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3780
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3180
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\0ddd7ac7-eeec-4134-a11d-07f650e58a82.tmp
Filesize9KB
MD5fca46baa9ba9c1ca8514c7bc2c564a13
SHA1ea04b8bef7acda689a72ad45e1e7e366016903bb
SHA2563310d5ffac49bae8e87f1eace5dcac95b100c75a250f645734af4d830ee4c42c
SHA5122b773eb4d97f19ecca89d8908a7efa3fcc8ce33ccf89e28271803ed195543c4c2966f2a8aa08bc439671e5998447cbe8f5a7216853112ffc94d27adb862dd528
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\20213474-d719-469e-8a18-2643d9146869.tmp
Filesize9KB
MD534484d35d3a7cb00ac12be93e0e7930b
SHA1e7fe0269859d5f9c06c9b8abcb3b841cc7a2b826
SHA2569a589144d6958a851fb961acdf0e0a33a67b72797c555ecd483a5da275f7b1e7
SHA512bded8990bc7ef41b20286d91524b4b246e975cb1b023322d06ac39c27dff2ce64a75d75b800b437f720160cef31143427a671c29736c78e18676b19fb71b61cf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\9d566763-6fc6-4e16-9f71-1014ee735593.tmp
Filesize9KB
MD54036efc37babb802f048f67e2a628f60
SHA19debefedde5105f45d3982edcd2dc14e37f11738
SHA2568d79487135b44c12936d4b7ebde04f070e96ea7ef27516f2034efae1b3b59520
SHA512751c87d9e3dac6c15a4da8710de6a4c4f8e7070984fd21e2c2f6abfb42734e98882660c9835972f43294a2954c797ef7db4065bde9cf4f6a83f387db0dea4e20
-
Filesize
649B
MD540f4d06c545bdaebd0c004570b290734
SHA1471c33b9da2f4e200c8a881e49437036196cab64
SHA2568695d87c95d7fdab3f9a7a07935d76ef4a617e1d71792d6539967ad6259e02e2
SHA5121183808e0719514be57f83fbb73f956e5b7d3f2d08f5156a151c9dce53d7f900a0a97ae62123ea886911c070d2c6d31f2017c8f960cf6fc2e23efe6e82aeaf4c
-
Filesize
1KB
MD5ac6e78ff77b92bc3bcf2d2d13a636262
SHA13b608fc982255e181f4ab53ba1c3942661675e8c
SHA256f88191b423b675b36d98ca6a0f7f7e4cca8f199afdf25a789ae3f1c724aaca23
SHA512f3bb49e09c0bb9a3acf2278de8a791c23b7400849b6b1b4129318281ff0099be9f160ae12bc6ffe00bd203044ae2552c1357b88c5f4e44b0df31e31a68f4213b
-
Filesize
1KB
MD57d196e2ac378fac4ac118e99119b19dd
SHA193fcfa58ffdb36a433623c0fafe6047c1a2c3229
SHA256dd38b3ae1486038da0f17e008f71b868dddae9be6ccdb6f8f5dfe2bafab6bfe8
SHA5120410f9424c3a149ef3d84626e84c941c007f9b1e099318803576b4f8e308176eb44f3768b371f8888f707623df839b0bea6d723d8891efa4bf7c7c936a8ec528
-
Filesize
1KB
MD56abf3464d5363a296f7622d3557afabf
SHA14e1fc57c43299a90240b7528b07d7075a2d232f2
SHA25686ebb45b9d6df22a63690e1ba6f73354257881b18597d65f9bfeed497075f8f2
SHA5129a108f33f85b20c6c01745061a7b923bc791258a1de560be1550d8298665c3bd59287ff32f2975d32277ae3f9f3c2c45d9da7ee8b01b969653fa88d022b2b292
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5717772238db01c9d92b144149ee8eb89
SHA14533824d7b42a9a8a5dd29c34a115bdbba10b6bf
SHA25662e4c797f110c7267626fb9bfa6d08e5e9e266f309212c18d8bd02de3627f3ae
SHA5120a2273a4e30ad874a8fc13c60a9ebd94bd3739d74a17d4cad946d80149f50693a68b6ea715f61b772d2270509e7e2b908c1e57ea94bf1db6891af76626884e22
-
Filesize
9KB
MD5765534d0acee7ad37adff0188e4917de
SHA1e33269354fcfc6fcd9e5ad3406b9b9cadc06032f
SHA256afdbde23cb9f0bf8c6019d4dc2abfe98116d8ce3d096ba02bcd1fa235ef9c673
SHA51293253eb72d1ca5d2fe1685914a9cf3671aa702439483f393a2a0463b3e9d2a6c05eb7ff54dda01d375b769889ac640cf3841cafcf4c722dbd373cad202aef260
-
Filesize
9KB
MD57a4d83ca0117a2cf69e7f475fb566924
SHA1c02280d879c91c668319b78fbdbe3a1c700213d3
SHA2562e12c100d98380d6fcfb792c496fe0a264f929a7e057518e0392ca674ff8cf18
SHA512548173193d7da727c811fa17ae4b2fd3a55a4315b096d893c177c14836a0aa3e075b0cfceb7bd1c9c73cfa6e8ec6e3beaee5f6680501c90a003e7baa13159eae
-
Filesize
9KB
MD5e71f27a64c4e131941deef6209a9220c
SHA15a8808cd9bbb85a2fda8a43d453e3dd6fa72256b
SHA25619ba7a9f27e220c8bbfe81b098ca83bcfb315fd3e295b9a7b3d9c242ca0f7202
SHA5127dd808b03ebdd9cf22077d3607135959a07a8ebdff201d32928c09628bb7652a2f8fba9bdd8e643d6b68c39763c7ebbacd36f4c4567af4d984e5da9c2d3ee0fe
-
Filesize
9KB
MD5f2aaa0e862354c5f2e6ace2bb5cfc959
SHA15a2ee16802b2be091f017a2d55e8f78959582ff4
SHA2560b76ba771de7ca0fd5485ec173396eb6a2d45da908d3f3c401adc5d7515a23c9
SHA512a6eddbdfd7b20bcde738cfb3edd37243e5a277a287544226df04e7f501dd7058679a07c3440986ac958f4018c9884a0531cc1b0d2ea88e79fbae339e088e03c9
-
Filesize
9KB
MD5c4be5f633f4fd4c9810b2840232e94d4
SHA1308630c76ca97c91b37504ccfdc1fd2f40aa1fec
SHA256b0c059ea004737ff7d6435879a55e4001ac3412bd62d6352daec068f1388de46
SHA512f94d147840fba2f785d150a5d5920f0c90a5691d9ead5a0fb66f5730ca3bb89d8b39ce370cf686431f1ee2f9abaf552b8f7cee2ba7b45f2f591fffff877f58c4
-
Filesize
9KB
MD5df16f7eb3e14467cfeb82d3009235bd3
SHA1268687142bf54f45f8d5b9abaf4014d9c03c3cd2
SHA2568506738951b554293e125b5214ea66c464e9c9b102283fdc858ae09cb2c20a70
SHA512d77549c5df8c24360bf2a544c1456d0dcdbe4a65d12ff0e7ed62f0e189109b0767353f38acf388d8debfca82864b5d86e87fb34ca339d047682751faf62bb6ae
-
Filesize
9KB
MD578870c6a6595a76c10ec06d3543fd94c
SHA117ce7fb18b120dfc3934dee8a4ff1c307071d1b5
SHA2567c5e30b1ff80e9d419a8b899bd213d864149fc5c7c8a5e6dbdcc45dc18635a9c
SHA512169b32069c2b0be7d037c12cbbb89ff1e405e092102a26f7e7fd4d17ee11141ecdb7066fd0459930881cf81abf33a0d451f064e3310c1cff6798db06addb4f27
-
Filesize
9KB
MD585ca335a218376a1fd93b3ce3d025b14
SHA104a07b2b3a93a81ef06a4cd7116b140d554f9d6a
SHA256600a7d601b1504a7ac28aa7d339986de8b6b3ddfec9e5c5169b671b4e2f60ae9
SHA512363cca4cac5eb612d2597d228ee3169f9fd765a93e5d3a377e0db6b7ff05a7af4852a79c69582bc67cd06bd05e498cebb09638a722991edd9145483bcc5810aa
-
Filesize
9KB
MD5b8196737f9f366a6d224744c9ebd1b00
SHA1c1a7921d8ccdcfc5eac35b39eb45dd88904a32db
SHA2565baf34ca249de5c0e7f655004ebba45edf231c27b62a5eea7c4a72511cfbafb5
SHA5127d749fd68dbcc5783405ba9430908f626cbbb99ef630a241f0f7f0db3873ddadb95736d476188c60efbb1026816dd9b7a202330e6d5173bc145845772a67c796
-
Filesize
9KB
MD52b10510234338bae761138e4ea99a0f6
SHA1236419568b20ae777eac3e8fc65da80436a1de78
SHA256d7e5c2a8a5bd8504bc402d0c691af6c5fd0d76ae99d877ce2cce869ce39838ba
SHA5120a1178cfbb34d71f8e53255d4a32ad129c142c19bee629bc5699d6fd6c3609d50b8f8734285e03bffad3612f736faca527b3830f8c660f8f2a613efb1321999d
-
Filesize
9KB
MD5a54d5046ac852450ce954ef658ce83e2
SHA1079f0b631f6edf838faa076c6def34517cd58d9d
SHA2563b4852425839f8f4f88f60f8d76ac84e15b3d780f5f4d65b6502298349df8274
SHA5126e296c4a4ccaf08478df49f6d1e64e57d0545ae9f40460dfb41f9ff456f85379f6083ca5c976923cc027de3ad15ecdc540049fbdbdc5bb45556e3cc474d6bc05
-
Filesize
9KB
MD57c67bc07cd0086d5b8878405dfcea8f1
SHA10f60da4c4d6bc18a4c074cd4bc358dd9e9a293d0
SHA2565d912e787e1479a4b45e38ff34c26fb27585002ee6b87e2a5eeb402f6f59a7e6
SHA512a7c94b4c59a68e0d8182d33db55f20cb849c66b5ab804587495106fcb57f912c02453a40578fb0723a9f4ce293c3dd18c3fb7fb3a579b51a7baedc6e83223cb9
-
Filesize
9KB
MD58ecb4659a3bd992e62f14f8556194229
SHA1ceb1e1e82269c820498076a324fb952c6ffb7e3c
SHA2560a766518ac9182d7bca8dfcc03870373c76a5f8d620dedcc6ba32cce20c16892
SHA5129f6e1117533411b24e5bf9028f844e46790bc816d6d855ed1a4fd602a4924d682d36f5c2487b9c9034e4ae5982a151754211430342f0e3d2097a639eac180edc
-
Filesize
9KB
MD5936b8bc530b7dc722b1b7427ee41044d
SHA16774c95d8c6e5d6596fa9efabf562f99919dfde0
SHA256041a86cacf7969f3b611c255c43409b43415c4606f923405ae4aa61401e40f93
SHA51260e94a497c9bde4b447b8f6a8b85a12c310001ef75c8a7d103e256608824a23d52b02800d8074a24f37f1455e4f92939cc6802b6c0b24ed7c55e563c303029c4
-
Filesize
9KB
MD5d76a368b92bfcf739043c00b07ceba4d
SHA17b3a39a4046b30d3293d64c366d9738bd86e37e5
SHA256476b1516da0c45066f4780d83e1f2cd3e72e5b41ccdd59776b0c7384c3a58e2e
SHA5128c1f6219dd82dc4e67491779a2c942d65afeeea982fe50214281b3a8826e92d2fb45b3f36e5e314ee52b062b85fc497fc9cc8b51a815fd0133fa32a3ae31653e
-
Filesize
9KB
MD5f4e3eb4822a32ac7a62c3746cc9dc67a
SHA1351fbf0fc248b4735300383fffa57a0f41af08f8
SHA25605fbaf95b2b18ef88fa084d6bb5a4225a340a95384ea8bfd47ae4ff649859d2e
SHA512089ea58633ea98401b457d3a1c642f44e6e7a7a912134df50b7502d42a9ea530aa59cb349d0e6d56e130c6806ee784d205b0a22aa47d91c3200612ca4117bd83
-
Filesize
9KB
MD521ae22ec1d8a0f362d840a7cd3a53748
SHA13d2fd50bb0ec4e574d22b0a754a891ad276ed253
SHA25697e53bfefc75a17930045ab6d6472dc9d6bbf62a801be4e5fb57b450a461945a
SHA51257adf12ab4d56c9f3d71e316fe79bfe4611b27cc35cc6cfc60e48e9a2d01ecb260f4cfa92fcf0927591cb5c19f2d38bd0c6b59c25e5bda2ee0adda5a29bb2fd4
-
Filesize
9KB
MD53ce8e57c429f9e020769e26c4abcc292
SHA15dff04f4e1357033a59a78ca55fa65e5b03aa458
SHA2562f28f118ed14d952c334a68a9fcdc02999258de8c31320c79dedb5f92d011b65
SHA51263400140ae164b4d5c1bdaee4d37b1505fd8e49eb61fb77d505a59dd2735bb8aba43b2b08dc1dbb24a4023adac3cd5cb503794334831f13a78f52f6659e39176
-
Filesize
9KB
MD513123a063fe13c07b2f709c1a270fa28
SHA1dd8ce66e3a89aa134afd147cb1f46d0a0af0774d
SHA25691d50fb8a215981f6b2996133a88e2f942615dba2c5bd73df9f501bea3056488
SHA5124092706bd45e3889631000d13887f3dbd4e565cd619dd1c4f7f3fac0cf5e7e7de669a77d58c559fd3834a5f9f5fc5569a0f32071d9497fb70550cc00ea5ed56f
-
Filesize
9KB
MD500e034015204fe4b33148cabda113b17
SHA12170118903c9cdbfe747f3201038f2fe91289a91
SHA256fca3bc74ebca12d78544bdcf166f622ea1b275312ff9c3cc43e8914b332ca240
SHA512adac0f421ccd99a7dfd6f68cf074fabe4eb048e910706a9086e8ea86f24b709d2b961cf91acbe9e2e6f8073dc8e3af065dbbe02d9c9800f011a82144fcde750d
-
Filesize
9KB
MD5caa0552f9cd40b87b44b80c2ac70cba9
SHA1573028826ffdc3bf46289f7206d9b041262148f8
SHA2564cdf35f42712026f41501e900465d351145e3169e6b340642385e2dafbe91060
SHA512b52b8a18f7965c2254b79b686001060e3d56a631cd05d80c55b3bbb86a1a381615775bd8c4395cd33ba992a1323aa418b58aab520c82923101fc0a89a6274a9a
-
Filesize
9KB
MD55c1c4ed873b95782b85009c997fa4f44
SHA1db9ed74879ad630f4b82e5d2d142f5c808bf8d48
SHA2564a9531551c5f0fbf64410137f937f9477e35a4e436f388de3448b7c5ce7d058c
SHA512eacc4cb7a352dbc884d0e0e5fdd1e37881c9d5ce04d8470d1f44839891855546f4bfa1991e0e6fba2f351592a86032b8c31e15dd0073c4f4a4f3dc9b50a6721d
-
Filesize
9KB
MD58496b8a0b7e68c7b41d7eca0700fb818
SHA11b6b2cececb117c3f26b865de0c5b52ab077a7e1
SHA256f7c796524511fa0fb7eb3bb4bbd0aed4b9ca6c3a998bd0ee39e02e7702350387
SHA51240873a7f43698cd77ba370d1b7ee0f61afd573eaa6a630bc07ae7ae8be9224df7229ab5abbd08e7a5361da95cd57d72725ba93410bd216b4f25fd359f5e01f04
-
Filesize
9KB
MD52af63fd2ffccfd78e71db75e2e1989b5
SHA1e8a66615c8c3822b60239a4eff4943d65112009f
SHA256280f96d40e553dea5f859af974efd6bcd39f5312019eab680b5fa1ccd34174eb
SHA5125f859954e7c9fee0211c4d34d8148be6770dd40143b320bfa62774560fd6df812a5e02f3e1c29d5d066c6916e26819f0299f63ed36cad2ab754ce823aed92221
-
Filesize
9KB
MD5f782bb7945962f6bcc1d96aa1c2833f3
SHA159f4dfee7cf2211d43fcf17ebc9f583b793f390b
SHA25663e92a5f6e9befcf864771f682e8d6021529eef3e6991313529490b0b7a9ed69
SHA51243e833168477fcac33df6f9991e19cada9797554345cbf00670fa81a6f4f5967f47f0c64a3fc11c800664bd859801f394eb275b0837f3db47697836a553cbcc3
-
Filesize
9KB
MD5bfbca4d245133acc82e6bfa929748476
SHA117f99d30dfabd488d7a080457502b74ac08146ab
SHA2565b809e98ec2c478d9d563adda491d02f8f5ab6fe1fb4f1005814406b127014ae
SHA512fa34462e50f23f2c41076d6f9517ed7c81b5f0c7bbe21c4ec24da4789473a4e4060322b84c4265cdd91c1104cb40e936c56ffe1c5146b62641cec4f2461718ed
-
Filesize
9KB
MD539afd44cce20a784968ba805033f1b0c
SHA10a85afb2aa9a5522948cd74023fe13ee3bbf66ac
SHA25698916b3132679d0500cec5f38e2971e7e7ca3cb8a2b95f937ed4af8ffe4b17e2
SHA51229363dbd454ff79b8761387a6751c380f55ab501d1ee0f2ca1738ee95c9e317e9e6ee1c55ceb2bbc805ec874ff4f9c97580f3a598f3e75f7150095ae9f94d00d
-
Filesize
9KB
MD51aabcf76fce7c6f18e0c0391417f9853
SHA1540e7873677ead1f20693d04cbe6bd5bf0f13060
SHA256bd66352fdac1424d32fa200da552f9e68b1752e573cb0618bc1cd4a8589c6613
SHA512df4e763f0432ca770496d5ce351559ea335b2714f4705c712323e4dbd8b77be03a910646743ad314c5007932afbcdc5199fcb46792b20b087f5a949135fb070d
-
Filesize
9KB
MD5152549fbad0743a88a182311408c4e63
SHA176f76528e992fa525ec6f6fd1a4c8bc689570425
SHA2562553c95908d090844f08a0dbdef26ff355b8d4d078a5c3ff156820c23d018412
SHA512186bfe9ac02bbefb6df748213197bd88f99f80fbb4566f0cad3d412fd58f462e89e18340e6b1aee41d419aaa682ca9dff7ef43f41b8c3ce75948031a055ef783
-
Filesize
9KB
MD52c9ee6eb9afa9b5a05757381ddd1fb50
SHA160db3670039d71ff728845fd3102e2d7aad6210a
SHA25631245aab7fadf54e044ce71e60edaf2b386ac25540d12d2083b7cd770a5127a7
SHA5125d651175b0ad7c0315a3cf4ff48f5237cf903a9c90bb2f10c10b9d6f9b6a884a04577096f331c232f32a4ed71f0385f99b5e54dc8908a4a96bee335f95a5373a
-
Filesize
9KB
MD5343c06c7bd4ff61cc5a956bc2ef4e43a
SHA1aa52bfda5432b6fb168e78d00e46e011c245f91e
SHA2566931024ad2dee5c8a4286452554d7215e85d79c7547f5b86abdc0c4c01aa0a4b
SHA5121a249d2ee42929983f8390879de096a433fdf630fd74c2005bbdf9c4f9c407d33fc88ceff9e3ffceccc48219be1db0c62008101fd37942ea7271c8a803a62371
-
Filesize
9KB
MD53000d56ee643046bb1945cae67f222ec
SHA13a50bf28815adc47df336cfbfc9de2eb78a837d6
SHA256a5319f58ac572a10696ecbdf137d2fdae2dd249717c3cff7851a5d680d90e913
SHA512ce369400b3d97c1cfef8762d32b127a5e761a5d37bf83eb1eabe5c78187586d79c21e9019b02ab82d24f6c91fee2fc5e069a0c459f128ad9872ce199dfc3cd32
-
Filesize
228KB
MD5e35c32f250676c2fe20f050d567cebc1
SHA1b651f253138f601f4427e54d46803c1dbd9f45b0
SHA256d107ba3d39ebde568341020278cac0965e221f158606d3ed33971941238d6b79
SHA5126f58030af66ea2ca550926a1e99dff15bdf202550ad8f139761a06cc66cc600258ab6d1d379eab64cbcdb3c875f4aef77233fdbdd1b19ddf3d5001a2ac4e8fe6
-
Filesize
228KB
MD58f61ad661b9c332eb15e824aa86d17bc
SHA18ebbb98604e140220a7bed18c8bf7c3c3eef514e
SHA256f2818ebb8f8c0aa2245f91710e01636d6bb48ccd67abac6604e3a3fdc69c4b47
SHA5120b137caee2ac1fc6a6ad0832eb9233f93b22c512f2bd8dbaca7125a92b2ac8ef2b7bcaf0973124e47d9b6f2ff4739eb52c90903e5223f0a30ec3e8989d278931