Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 06:48
Static task
static1
Behavioral task
behavioral1
Sample
a32489e47687a44d8a35bc90357f1723.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a32489e47687a44d8a35bc90357f1723.html
Resource
win10v2004-20240221-en
General
-
Target
a32489e47687a44d8a35bc90357f1723.html
-
Size
66KB
-
MD5
a32489e47687a44d8a35bc90357f1723
-
SHA1
66eff56c6ed9e6ca0199db65a60588807c81d097
-
SHA256
6c692bf5782d8ada7dd8a4232731bf0f8c83e9157319af8dd776ef084f818ad8
-
SHA512
7bb961a78c2d3eeba7e3a4ca3d63ae009d64efff1403110ea886230310612c64e678152cab45236581286d671b9d42adb5490f897f1445419ad12c8c7b21813f
-
SSDEEP
1536:O3+HH2dJ/qxMbJz2lM7iM/1BedsEy69rCX7CeHA8s0r2gtV:xHWXyxMUMGMdBedsEL9rCX7Ce1sRgtV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 2472 msedge.exe 2472 msedge.exe 4596 identity_helper.exe 4596 identity_helper.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2472 wrote to memory of 880 2472 msedge.exe 33 PID 2472 wrote to memory of 880 2472 msedge.exe 33 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 3384 2472 msedge.exe 89 PID 2472 wrote to memory of 4692 2472 msedge.exe 88 PID 2472 wrote to memory of 4692 2472 msedge.exe 88 PID 2472 wrote to memory of 2692 2472 msedge.exe 90 PID 2472 wrote to memory of 2692 2472 msedge.exe 90 PID 2472 wrote to memory of 2692 2472 msedge.exe 90 PID 2472 wrote to memory of 2692 2472 msedge.exe 90 PID 2472 wrote to memory of 2692 2472 msedge.exe 90 PID 2472 wrote to memory of 2692 2472 msedge.exe 90 PID 2472 wrote to memory of 2692 2472 msedge.exe 90 PID 2472 wrote to memory of 2692 2472 msedge.exe 90 PID 2472 wrote to memory of 2692 2472 msedge.exe 90 PID 2472 wrote to memory of 2692 2472 msedge.exe 90 PID 2472 wrote to memory of 2692 2472 msedge.exe 90 PID 2472 wrote to memory of 2692 2472 msedge.exe 90 PID 2472 wrote to memory of 2692 2472 msedge.exe 90 PID 2472 wrote to memory of 2692 2472 msedge.exe 90 PID 2472 wrote to memory of 2692 2472 msedge.exe 90 PID 2472 wrote to memory of 2692 2472 msedge.exe 90 PID 2472 wrote to memory of 2692 2472 msedge.exe 90 PID 2472 wrote to memory of 2692 2472 msedge.exe 90 PID 2472 wrote to memory of 2692 2472 msedge.exe 90 PID 2472 wrote to memory of 2692 2472 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a32489e47687a44d8a35bc90357f1723.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe0f6146f8,0x7ffe0f614708,0x7ffe0f6147182⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,1522671420175853291,14159796374476629030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2460 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,1522671420175853291,14159796374476629030,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:22⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,1522671420175853291,14159796374476629030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1522671420175853291,14159796374476629030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1522671420175853291,14159796374476629030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1522671420175853291,14159796374476629030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1522671420175853291,14159796374476629030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1522671420175853291,14159796374476629030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1522671420175853291,14159796374476629030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1522671420175853291,14159796374476629030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,1522671420175853291,14159796374476629030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:82⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,1522671420175853291,14159796374476629030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1522671420175853291,14159796374476629030,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6432 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1522671420175853291,14159796374476629030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6400 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1522671420175853291,14159796374476629030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1522671420175853291,14159796374476629030,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,1522671420175853291,14159796374476629030,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3112 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1356
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51af9fbc1d4655baf2df9e8948103d616
SHA1c58d5c208d0d5aab5b6979b64102b0086799b0bf
SHA256e83daa7b2af963dbb884d82919710164e2337f0f9f5e5c56ee4b7129d160c135
SHA512714d0ff527a8a24ec5d32a0a2b74e402ee933ea86e42d3e2fb5615c8345e6c09aa1c2ddf2dea53d71c5a666483a3b494b894326fea0cc1d8a06d3b32ec9397d3
-
Filesize
152B
MD5aa6f46176fbc19ccf3e361dc1135ece0
SHA1cb1f8c693b88331e9513b77efe47be9e43c43b12
SHA2562f5ba493c7c4192e9310cea3a96cfec4fd14c6285af6e3659627ab177e560819
SHA5125d26fdffebeb1eb5adde9f7da19fe7069e364d3f68670013cb0cc3e2b40bf1fbcb9bdebbfe999747caf141c88ccd53bd4acf2074283e4bde46b8c28fbae296f5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD59347d4817a1fa3bf5c04daf3b01449d5
SHA1a1cc134359d37fffe42322f9090b7f9e0889716e
SHA256040e11f8df7b5e0895b7d832c8ae877ac235666c3da68cdff7b2168b462e41a5
SHA512305a3a040f0e1d845e9dd0b97dcdc68f8efbafbc08d3557c4a3eea0fc40d8b31c442bab6e35551d5ab9a9b0ff8fbc6d75ee6a9a166e5602478e59eee92bcf784
-
Filesize
1KB
MD5053ad9e24f89a38a98f8a7ec5650ac5b
SHA1e3e04f140f38865dc38eff5efa55af1f95a725b9
SHA256c1f212cc207a963f7df56d47290778d1298ce2bae8a9ab43bfcbd874afd0b540
SHA512d3f74c770686098cbac50505d81178232ec26345c68b46123c44a018ea0ec87d0f1a7389cfc86080fd0ce2ff6e115674eb1e1158d91b7f5a334c6b5970f19432
-
Filesize
1KB
MD5da27d72a06cc8784dd435ed9662f96ab
SHA145c9a738fd49e20777298cbb48864413843ea02d
SHA256161791ee6140c7511deb16a9f267b28c62b08b65f87f11d46523d3c0fd18ba48
SHA5126cee897f49378547660a59f7db004e5cc4cc324f1a8644266d404ca385ef1908dcae143b141aa1b3ab00a60c80aa6b898bf812587ec4d59bb9cef7366bd51f27
-
Filesize
6KB
MD5e7facd1d9a4a2377e54690c4ef0f63d0
SHA17da00c7a7da741a3d25f652d66360533645cd036
SHA25628964964597a660b134a7a91325c7e620cf5ae3d679eac23951be29e026f85c9
SHA512772320aa9697f99eb49e16a310f447a552f20a0a48edc8e1bae83a54e390fc8a8fff5bfc9f6bd607b5cf9eadfa126408799be049b0799fbae5dfe450246e57c8
-
Filesize
6KB
MD5d609216947072abc85f474e50f31227e
SHA14f8eac61f0c98a123e6b79f7f18259896024d4ed
SHA256dff875fca6977613b63cddac4a880396fbec28ff1d7d32a5d513fbff7bc3beb6
SHA51227de373acab309f2eaa3e8e19d1ab872271f78e7e412e204da544a42897ab80f28ce002d8e138dd28c68139722957823a27c6443a130533f1948c4da4160b8b5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54807dd6d13abf2069fa8fcdc6bcf2a42
SHA1ec7ed86fa90bde33a0162e2e6bca5a791853e1d5
SHA2563ae2f723d3fc7c6b62a3621dc2a5c18f28ac8ca64930e6513c21b965522eb29e
SHA51232e933c0c4140f822fc61a2f10fe9c3be57796095c563004e7984edbff9690736c8fb8e4838905e789214cb08a6e4b020519f5e5b41de0ee234b36a6a2a48efe