Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
c60f62110524e1aa95bbb59a3394085b.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c60f62110524e1aa95bbb59a3394085b.html
Resource
win10v2004-20240226-en
General
-
Target
c60f62110524e1aa95bbb59a3394085b.html
-
Size
15KB
-
MD5
c60f62110524e1aa95bbb59a3394085b
-
SHA1
ad9f7d131195ce194f7cfa44374b04bcbbab692a
-
SHA256
6cccc5e1211c44a22775325b33fb64ec197ebee8c0be6340c10a600f84720c61
-
SHA512
124d0b6fcb18268c82d669074a07387f82a0843029d7aa1f7f553e83d78d0992ed146d76dbaf3451b4b2e3a2152b69cfc22a3d0aaff80988441ba2a9d649c5f8
-
SSDEEP
384:SHc5quzYNbLXyp685jhh5JFh9tM8UkJC5MYK:SHc5quUGpXTWD5XK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4052 msedge.exe 4052 msedge.exe 3452 msedge.exe 3452 msedge.exe 1720 identity_helper.exe 1720 identity_helper.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3452 wrote to memory of 2920 3452 msedge.exe 89 PID 3452 wrote to memory of 2920 3452 msedge.exe 89 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 5096 3452 msedge.exe 90 PID 3452 wrote to memory of 4052 3452 msedge.exe 91 PID 3452 wrote to memory of 4052 3452 msedge.exe 91 PID 3452 wrote to memory of 4792 3452 msedge.exe 92 PID 3452 wrote to memory of 4792 3452 msedge.exe 92 PID 3452 wrote to memory of 4792 3452 msedge.exe 92 PID 3452 wrote to memory of 4792 3452 msedge.exe 92 PID 3452 wrote to memory of 4792 3452 msedge.exe 92 PID 3452 wrote to memory of 4792 3452 msedge.exe 92 PID 3452 wrote to memory of 4792 3452 msedge.exe 92 PID 3452 wrote to memory of 4792 3452 msedge.exe 92 PID 3452 wrote to memory of 4792 3452 msedge.exe 92 PID 3452 wrote to memory of 4792 3452 msedge.exe 92 PID 3452 wrote to memory of 4792 3452 msedge.exe 92 PID 3452 wrote to memory of 4792 3452 msedge.exe 92 PID 3452 wrote to memory of 4792 3452 msedge.exe 92 PID 3452 wrote to memory of 4792 3452 msedge.exe 92 PID 3452 wrote to memory of 4792 3452 msedge.exe 92 PID 3452 wrote to memory of 4792 3452 msedge.exe 92 PID 3452 wrote to memory of 4792 3452 msedge.exe 92 PID 3452 wrote to memory of 4792 3452 msedge.exe 92 PID 3452 wrote to memory of 4792 3452 msedge.exe 92 PID 3452 wrote to memory of 4792 3452 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c60f62110524e1aa95bbb59a3394085b.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabd4146f8,0x7ffabd414708,0x7ffabd4147182⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,3790397816043243677,559989682248725216,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,3790397816043243677,559989682248725216,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,3790397816043243677,559989682248725216,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2536 /prefetch:82⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3790397816043243677,559989682248725216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3790397816043243677,559989682248725216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3790397816043243677,559989682248725216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=212 /prefetch:12⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3790397816043243677,559989682248725216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3790397816043243677,559989682248725216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3790397816043243677,559989682248725216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,3790397816043243677,559989682248725216,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,3790397816043243677,559989682248725216,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3790397816043243677,559989682248725216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3790397816043243677,559989682248725216,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3790397816043243677,559989682248725216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3790397816043243677,559989682248725216,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,3790397816043243677,559989682248725216,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5907340e47c5712938e5cf2bde87fa49a
SHA143946a5ffce5ccae1c05c05cce679fd4203fca63
SHA25665144beb97ec42c7c6ca579015aa30b11003f81bdb760eb2ba2b4a890d3ae9db
SHA512093b136bab84004d463a8d85d451834be275f967716f3f2a90c109b66cbd1d996dc9c1fae8609aa810fc8d04118aba05ee98e2785406b47f432f8e18dc33200f
-
Filesize
1KB
MD53f4cbfafd0d21f2c6e6182dc8ff58030
SHA108ff02eb1501c45925a1feb12693be9c4ed85178
SHA256c8342580e6a7053cd24694b36ec380039275897e133574a091e4d6d5452eb38c
SHA51291cd63e2ba481ffc5058e4379cc3d091fba64922e2ccdde7db4d2545a52578780690b96a88ea954ca06260b750f5c3eedbac5d79f2f3bb516d34a942cc31d521
-
Filesize
512B
MD5e5a57e87807cf0efb368cd1b4c4ef63d
SHA158e877474c01e937487c5613c450bcb1dc232efa
SHA25686133f78426b4461420a61dcbfe6727e28971887355468f06c3e8aa47e40c509
SHA512a14c65a973df227519bc04250a6bf0a9421582eee53fd9ab2c46a5f7445b0512b3ffbe2395b71115abab5e1da0813b508ab5b79c274e7b1712f741409570fe04
-
Filesize
6KB
MD579041795a8beae1ddc047e4db39ece79
SHA1d93e7cc1046ed46d639a620893e5674ddb077dd1
SHA256411cac84aabe65b285e860287ad327bc50a70b00003897c0aae99c85e8592dbc
SHA512db953f4ac7a81016877b0cad8d2765cab899ba7f61f37608ee22d6e5fc8996b6deb6e3bb0bd7a9ffef1aad0cb6a44956e1326e99ed29a0aa7a716576d693741a
-
Filesize
6KB
MD554d39cc774949db662bde2039d757b18
SHA1597627a1f1b6d736f27b9a816933e1752afdf75d
SHA25639936e7bee92a4989abf3fc7d9d550e1262e1c9362e498fa937a37bbe12f5a63
SHA51291ea8b7922606a60173896b0677bca95cd551f16817d71f1a711c2e9553c46ad84e9d179d7c5a71acb35c83e7965f0ca45da9bce2f02c0d71dac957962c196b0
-
Filesize
6KB
MD555cd3e60abf87f6b736818504e31f060
SHA194c088c7ba996608be85af81c2282c81ae670c1e
SHA2564285879ee7bad251577148bbc5d01072280ab7eb5f6b017d8278d766ea3ff460
SHA512cad36912fdd0b16e202d42f4abeb7bb21cdd1dc1da1a91e50aea8524f4ed7b3ddb0b331448f6aee3a7a343e768100c55c7866fc979ff9eafb389a60c3e88922b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5706f327cf6cc447cade692ce1efd1bf6
SHA11679f8f39200e632d97eb2dfc3773113c14df4fd
SHA256dae951e7829416f487657d0dbdae1e90f7008ba2dbba53ad31fab8f71221e75f
SHA5123520895ed6e0f0742ec0f08ee13bb38b31abb919d8ab722898a0ea62dc8031f1c8ad3e906912faa01aca7e6b2ada7c99b8f2eb9818d2bca5ae33a3f416f4a671