Analysis
-
max time kernel
159s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 19:18
Behavioral task
behavioral1
Sample
8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe
Resource
win10v2004-20220812-en
General
-
Target
8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe
-
Size
14KB
-
MD5
0de95947b0c7e4515e104eef17ea4322
-
SHA1
7926ebe1ac582c8ea7421fe4209ad2b8fe37957d
-
SHA256
8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd
-
SHA512
f98be3d89105f296984a3232aecf27dce727d753cdff86585de94f261cde2d75123a5f494e07d6f8318b09c9bec3ae1b138b8870acf7bcb839abd8f34b7fc7d5
-
SSDEEP
384:byi8T5ePaOaNJawcudoD7UG5A4VoeM4mK:byXTKsnbcuyD7UgVDz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4960 b2e.exe -
resource yara_rule behavioral2/memory/4128-132-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation b2e.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\85f61e0c-faa3-4be8-aaf3-ffb7ff114021.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221108151043.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 1092 msedge.exe 1092 msedge.exe 4344 identity_helper.exe 4344 identity_helper.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4128 wrote to memory of 4960 4128 8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe 81 PID 4128 wrote to memory of 4960 4128 8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe 81 PID 4128 wrote to memory of 4960 4128 8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe 81 PID 4960 wrote to memory of 1324 4960 b2e.exe 82 PID 4960 wrote to memory of 1324 4960 b2e.exe 82 PID 4960 wrote to memory of 1324 4960 b2e.exe 82 PID 1324 wrote to memory of 1092 1324 cmd.exe 85 PID 1324 wrote to memory of 1092 1324 cmd.exe 85 PID 4960 wrote to memory of 1444 4960 b2e.exe 87 PID 4960 wrote to memory of 1444 4960 b2e.exe 87 PID 4960 wrote to memory of 1444 4960 b2e.exe 87 PID 1092 wrote to memory of 2112 1092 msedge.exe 88 PID 1092 wrote to memory of 2112 1092 msedge.exe 88 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 2936 1092 msedge.exe 91 PID 1092 wrote to memory of 3940 1092 msedge.exe 92 PID 1092 wrote to memory of 3940 1092 msedge.exe 92 PID 1092 wrote to memory of 4648 1092 msedge.exe 94 PID 1092 wrote to memory of 4648 1092 msedge.exe 94 PID 1092 wrote to memory of 4648 1092 msedge.exe 94 PID 1092 wrote to memory of 4648 1092 msedge.exe 94 PID 1092 wrote to memory of 4648 1092 msedge.exe 94 PID 1092 wrote to memory of 4648 1092 msedge.exe 94 PID 1092 wrote to memory of 4648 1092 msedge.exe 94 PID 1092 wrote to memory of 4648 1092 msedge.exe 94 PID 1092 wrote to memory of 4648 1092 msedge.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe"C:\Users\Admin\AppData\Local\Temp\8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\8801.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\8801.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\8801.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\8b045f40d0bce83a14cd05ab408d7ae14e2c044b3141446d5bde31f6ffc9c4dd.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BB46.tmp\batfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://ads.regiedepub.com/cgi-bin/advert/getads?x_dp_id=434⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffcf6246f8,0x7fffcf624708,0x7fffcf6247185⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,176434368463366188,6288138306071954247,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:25⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,176434368463366188,6288138306071954247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,176434368463366188,6288138306071954247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:85⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,176434368463366188,6288138306071954247,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:15⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,176434368463366188,6288138306071954247,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:15⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2120,176434368463366188,6288138306071954247,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4860 /prefetch:85⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,176434368463366188,6288138306071954247,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:15⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,176434368463366188,6288138306071954247,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:15⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,176434368463366188,6288138306071954247,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:15⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2120,176434368463366188,6288138306071954247,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5868 /prefetch:85⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,176434368463366188,6288138306071954247,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:15⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,176434368463366188,6288138306071954247,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:15⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,176434368463366188,6288138306071954247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3908 /prefetch:85⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings5⤵
- Drops file in Program Files directory
PID:2820 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x27c,0x280,0x284,0x258,0x288,0x7ff685605460,0x7ff685605470,0x7ff6856054806⤵PID:4436
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,176434368463366188,6288138306071954247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3908 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2120,176434368463366188,6288138306071954247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5100 /prefetch:85⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,176434368463366188,6288138306071954247,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7120 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\selfdel0.bat" "3⤵PID:1444
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1820
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD56a7329f15480d4ca075dd593c7572d14
SHA1cbe94a895b719efdb2309e2d3cdd469c5c5fef55
SHA25650c8fe18a33985b19b5a88d9d6d94193079aea9cfaa89be9b28ec771e04e4670
SHA512ba0a5b9fa41faadebe8124d44e03bb05fb5e6a9eec4052c90fc2d30852200e789b6183afd9deeea64c8aa944b8f28d6ef983dd64f1aaf581d930a98d5240f874
-
Filesize
8KB
MD56a7329f15480d4ca075dd593c7572d14
SHA1cbe94a895b719efdb2309e2d3cdd469c5c5fef55
SHA25650c8fe18a33985b19b5a88d9d6d94193079aea9cfaa89be9b28ec771e04e4670
SHA512ba0a5b9fa41faadebe8124d44e03bb05fb5e6a9eec4052c90fc2d30852200e789b6183afd9deeea64c8aa944b8f28d6ef983dd64f1aaf581d930a98d5240f874
-
Filesize
77B
MD5ba7c5c724c70ee9f04c4933b18083e49
SHA1d6c6dcbe9cbfb829296dc21ff41292cac64fdc9c
SHA256aad13997529ce15c8b987178057a01b5e8236f0daf5b94f29dabaa778105388c
SHA512d34f0f812c72580e1c505da5dfa636e18fea800cbf36e2ed11bfc423cf7a871981991b3a7e65e45b54aeb15f3f37f8eaef2e408a03585f2c46c95fbcbf63e09b
-
Filesize
158B
MD5141f8789e303a04df6c82d772da69e8f
SHA12d096c1f32f384015486c46f765359893008be51
SHA2563160b0a7cf1703af69bb2103a100bcdbc500520e56f94b7dc32cc73522297c03
SHA51238346e00fce5536b5d102ea12f182d894c051c017d40f4108323b2956c52cb9b387edb8ce69cf07351e8df56e23b113c9cd2916cf9b997d3b5e92eeddaa96f34