Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 01:11
Behavioral task
behavioral1
Sample
29d9cb601a75b110ec2b52a5e98bf4c4e59df0a4f5f9bf7c5f159be0dbec25cc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29d9cb601a75b110ec2b52a5e98bf4c4e59df0a4f5f9bf7c5f159be0dbec25cc.exe
Resource
win10v2004-20231222-en
General
-
Target
29d9cb601a75b110ec2b52a5e98bf4c4e59df0a4f5f9bf7c5f159be0dbec25cc.exe
-
Size
40.4MB
-
MD5
fde366540ecc2b65309e1a1704bfda1f
-
SHA1
23632ee34cd173a41821a3825e57b914079119cd
-
SHA256
29d9cb601a75b110ec2b52a5e98bf4c4e59df0a4f5f9bf7c5f159be0dbec25cc
-
SHA512
694705b6ad042cacb4a33bdd8877663861e9a8554d3f50fcbd5e296185db0e712868760963f00a5a4eb8c6da4ab38c574eb68314ab73182627bbdd8559907d67
-
SSDEEP
786432:kLZiTfRwFQlii9xaEBwhIywIYfcDxvVJaPZ:kLIf2xyQbYfcD1G
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 928 msedge.exe 928 msedge.exe 3964 msedge.exe 3964 msedge.exe 4056 identity_helper.exe 4056 identity_helper.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4956 wrote to memory of 3964 4956 29d9cb601a75b110ec2b52a5e98bf4c4e59df0a4f5f9bf7c5f159be0dbec25cc.exe 88 PID 4956 wrote to memory of 3964 4956 29d9cb601a75b110ec2b52a5e98bf4c4e59df0a4f5f9bf7c5f159be0dbec25cc.exe 88 PID 3964 wrote to memory of 4416 3964 msedge.exe 89 PID 3964 wrote to memory of 4416 3964 msedge.exe 89 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 64 3964 msedge.exe 92 PID 3964 wrote to memory of 928 3964 msedge.exe 90 PID 3964 wrote to memory of 928 3964 msedge.exe 90 PID 3964 wrote to memory of 3384 3964 msedge.exe 91 PID 3964 wrote to memory of 3384 3964 msedge.exe 91 PID 3964 wrote to memory of 3384 3964 msedge.exe 91 PID 3964 wrote to memory of 3384 3964 msedge.exe 91 PID 3964 wrote to memory of 3384 3964 msedge.exe 91 PID 3964 wrote to memory of 3384 3964 msedge.exe 91 PID 3964 wrote to memory of 3384 3964 msedge.exe 91 PID 3964 wrote to memory of 3384 3964 msedge.exe 91 PID 3964 wrote to memory of 3384 3964 msedge.exe 91 PID 3964 wrote to memory of 3384 3964 msedge.exe 91 PID 3964 wrote to memory of 3384 3964 msedge.exe 91 PID 3964 wrote to memory of 3384 3964 msedge.exe 91 PID 3964 wrote to memory of 3384 3964 msedge.exe 91 PID 3964 wrote to memory of 3384 3964 msedge.exe 91 PID 3964 wrote to memory of 3384 3964 msedge.exe 91 PID 3964 wrote to memory of 3384 3964 msedge.exe 91 PID 3964 wrote to memory of 3384 3964 msedge.exe 91 PID 3964 wrote to memory of 3384 3964 msedge.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\29d9cb601a75b110ec2b52a5e98bf4c4e59df0a4f5f9bf7c5f159be0dbec25cc.exe"C:\Users\Admin\AppData\Local\Temp\29d9cb601a75b110ec2b52a5e98bf4c4e59df0a4f5f9bf7c5f159be0dbec25cc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x86&rid=win10-x86&apphost_version=7.0.10&gui=true2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0e1c46f8,0x7ffb0e1c4708,0x7ffb0e1c47183⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,4020610731331883185,5090638768460889979,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,4020610731331883185,5090638768460889979,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:83⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,4020610731331883185,5090638768460889979,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:23⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4020610731331883185,5090638768460889979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:13⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4020610731331883185,5090638768460889979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:13⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4020610731331883185,5090638768460889979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:13⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4020610731331883185,5090638768460889979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:13⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,4020610731331883185,5090638768460889979,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:83⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,4020610731331883185,5090638768460889979,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4020610731331883185,5090638768460889979,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:13⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4020610731331883185,5090638768460889979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:13⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4020610731331883185,5090638768460889979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:13⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4020610731331883185,5090638768460889979,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:13⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,4020610731331883185,5090638768460889979,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4172 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51386433ecc349475d39fb1e4f9e149a0
SHA1f04f71ac77cb30f1d04fd16d42852322a8b2680f
SHA256a7c79320a37d3516823f533e0ca73ed54fc4cdade9999b9827d06ea9f8916bbc
SHA512fcd5449c58ead25955d01739929c42ffc89b9007bc2c8779c05271f2d053be66e05414c410738c35572ef31811aff908e7fe3dd7a9cef33c27acb308a420280e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5638285ea6324f6c13c317d134f56adec
SHA1c260e11ef8eccb76b84d949f308cbe443e7ad177
SHA2569d5bc4d848255d250864c32d3e4903cd403f4204626e770ed819bdd1daec05ab
SHA5125511804c97c3fa7f0b27e053e5ff38802650fa5b6e435f25862427c930f4282909471d5482b7b151a7658054a57c284f8be449c00962768ef7aa236b0aed623a
-
Filesize
909B
MD58be38b56467271b7bf968ae0c4fb5450
SHA1f4a391f432425d81ba2c86ef9fc3dbe908cd5e4e
SHA256fff58d52cfd59cd57c955e6401110c78c0d14f31906d645acb063e2f3fedf717
SHA512c80ba967bb6ab96479f6696be423fc578ad55ab4ac7a05f61c72f717c6045abb4273d4dfc1cc366f0ef3f96872b45e9e40ec6db2b6dbd28eb652f03511f0ecfc
-
Filesize
5KB
MD5eaad246b1f4003036da1dd27131835ef
SHA1027157bc8cb3987f6df1f05a36418c37f5db986b
SHA25647870a7ec9cd609f5bd0c5f009768c617483a19635e4b6d1d2671faf66055224
SHA5127f4939adfbe02d3e5d6f3bc731cafb126027f4bb65979dcf3b880103f079a3e74615066bf798e25f9c305b88c5480eeb7474bf2a159517f3b6bb9dca33f351ff
-
Filesize
5KB
MD583e0fb048603c4aba29e58d6b1525cd6
SHA17765e650c4388f37de5ab13d2fba2c536dee3bef
SHA25679663262f1e473bb1841044d8a4aca341faad54dc72124a78e5909d751315418
SHA5124fc1a2ef3caabb107460c3cabf71d2ba9b999944b4c515490c621619ca28e08950291e20b9c093c5fe926fd31894660a9631c3979ee5ab1c567615d937caf6b0
-
Filesize
24KB
MD5e664066e3aa135f185ed1c194b9fa1f8
SHA1358ff3c6ad0580b8ae1e5ef2a89a4e597c2efdc5
SHA25686e595be48dbc768a52d7ea62116036c024093e1302aced8c29dd6a2d9935617
SHA51258710818b5f664006a5aa418da6c8cd3f709c2265bc161f81b9dfe6cdb8304fabaa4ce9deba419fe4281623feeeaa0321f481ae5855d347c6d8cf95968ee905e
-
Filesize
705B
MD5e45b7381e52f91af5a3db34faa36034e
SHA1e3270f7895b96b5cf1411a914cf233d8c09f91af
SHA256604a5d19d0137d50f22083d47a41b70922973f25b9dcb699fd4a23b95a334d3f
SHA51227bfd899561e341209d76216185035afc90461eb089d23b22a67e3e53d2607a8c3116f523187ded2e2699890403f7732e82ee5da1e96708725fa81dc9dca4b13
-
Filesize
705B
MD5dab07596f62238396f2ad378221ec510
SHA149fb096bfe5a5f581c3c7fcfa10b4086bf7dcfa5
SHA25605f6f2984b4424513861220869ad50984748959e0a85c74bd0419961a6133d17
SHA51268dd27852636e579cb716683086a2c021be72ea8168690bbca17276d62a28d3ba99d15340bd4d87b26ddcd1540f1806c1948e028007d626d55d1cbe2e9c151cd
-
Filesize
707B
MD5637e03bc33b88cfa077dff45979514e3
SHA17782dbe9635aa652da244c5bea925a406d57cb5d
SHA256d4066da52734db1bba4d3f1121476598d296cc5d03ac4d81818c467f75ed09f8
SHA5124cf1fbd8b3318702c2444b1414b08b1a9d16713c9bef0480c57a00757c96f48a1aa12f8ec537c8d24b859c85e7a73182b4947087fe481168615e5f94b28252d0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fb7c00ee5af3f33f38b45df5d34a11b1
SHA18770ac71f9f977713045e7871380b0bd22d73ff2
SHA256216175eaf3886903163e6dfa0426e764e36aeb2d2fb502ac31420c62b91ac115
SHA51282eea0eff7d8173a79ed8588c2584f8a26de6f7fd056722f293ee6ba0751509df71921e4de2303d1a435da37f4e6052279af00d1b3b53107fa17dea3d40b63a7