Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 15:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/wifido/spms-code/blob/893bf9e7ea4967c6ceaa4ba2ed5f4649c9c26d6f/doc/7-maintenance/SPMS-CORE-V1.0-%E8%BD%AF%E4%BB%B6%E9%83%A8%E7%BD%B2%E5%9B%BE.vsd
Resource
win10v2004-20240226-en
General
-
Target
https://github.com/wifido/spms-code/blob/893bf9e7ea4967c6ceaa4ba2ed5f4649c9c26d6f/doc/7-maintenance/SPMS-CORE-V1.0-%E8%BD%AF%E4%BB%B6%E9%83%A8%E7%BD%B2%E5%9B%BE.vsd
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 78 raw.githubusercontent.com 79 raw.githubusercontent.com 69 raw.githubusercontent.com 70 raw.githubusercontent.com 71 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 1396 msedge.exe 1396 msedge.exe 4616 identity_helper.exe 4616 identity_helper.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1396 wrote to memory of 4008 1396 msedge.exe 87 PID 1396 wrote to memory of 4008 1396 msedge.exe 87 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4068 1396 msedge.exe 88 PID 1396 wrote to memory of 4304 1396 msedge.exe 89 PID 1396 wrote to memory of 4304 1396 msedge.exe 89 PID 1396 wrote to memory of 2248 1396 msedge.exe 90 PID 1396 wrote to memory of 2248 1396 msedge.exe 90 PID 1396 wrote to memory of 2248 1396 msedge.exe 90 PID 1396 wrote to memory of 2248 1396 msedge.exe 90 PID 1396 wrote to memory of 2248 1396 msedge.exe 90 PID 1396 wrote to memory of 2248 1396 msedge.exe 90 PID 1396 wrote to memory of 2248 1396 msedge.exe 90 PID 1396 wrote to memory of 2248 1396 msedge.exe 90 PID 1396 wrote to memory of 2248 1396 msedge.exe 90 PID 1396 wrote to memory of 2248 1396 msedge.exe 90 PID 1396 wrote to memory of 2248 1396 msedge.exe 90 PID 1396 wrote to memory of 2248 1396 msedge.exe 90 PID 1396 wrote to memory of 2248 1396 msedge.exe 90 PID 1396 wrote to memory of 2248 1396 msedge.exe 90 PID 1396 wrote to memory of 2248 1396 msedge.exe 90 PID 1396 wrote to memory of 2248 1396 msedge.exe 90 PID 1396 wrote to memory of 2248 1396 msedge.exe 90 PID 1396 wrote to memory of 2248 1396 msedge.exe 90 PID 1396 wrote to memory of 2248 1396 msedge.exe 90 PID 1396 wrote to memory of 2248 1396 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/wifido/spms-code/blob/893bf9e7ea4967c6ceaa4ba2ed5f4649c9c26d6f/doc/7-maintenance/SPMS-CORE-V1.0-%E8%BD%AF%E4%BB%B6%E9%83%A8%E7%BD%B2%E5%9B%BE.vsd1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbce1d46f8,0x7ffbce1d4708,0x7ffbce1d47182⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,16743717033212412824,11022420886845923310,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,16743717033212412824,11022420886845923310,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,16743717033212412824,11022420886845923310,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:82⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16743717033212412824,11022420886845923310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3116 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16743717033212412824,11022420886845923310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,16743717033212412824,11022420886845923310,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:82⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,16743717033212412824,11022420886845923310,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16743717033212412824,11022420886845923310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16743717033212412824,11022420886845923310,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16743717033212412824,11022420886845923310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16743717033212412824,11022420886845923310,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2140,16743717033212412824,11022420886845923310,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5076 /prefetch:82⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,16743717033212412824,11022420886845923310,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,16743717033212412824,11022420886845923310,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1172
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5003e2dfc9f899089f675593a0b14a495
SHA1fbf17d6a57af30af4d71f7cf98539c1e0cab0219
SHA2569b4ad1dc0658056ec2d933cff9ed8a4fabdb56c7b3364c3ecfd75e99ba04b1a2
SHA512f1d12a77856e2934588a976510a72d50501758e0cf07f46d39326e56588c63fcf8dff5d82aa1af206e8ad1272160305e696607e2b960d75e81337e2509ec5b6a
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
492B
MD5aa12a4329040c53e6405bf8207db6ced
SHA12406f046273132d2af136cdc4baa12e464a6a8d4
SHA256dcadc13ede2a08e68bc2db48026d84d4d9e5e9b47866c3d3585a60f231d54feb
SHA5122a94e26ab14748bc723b359c48c7b685a3fe2ecbc2ed558b87106cafff1573b14067c5e43138f3d2902dd084e404dfc236a70765c1cf5cf08c467f657a796297
-
Filesize
6KB
MD5c41ad5926b8af4a6726ab2f84dfb3c7f
SHA17ec4a3027a9d07c027b2823dfde4c77cf7f2745a
SHA2569d0c62bbaf503c3f809762838cb3a1a03d0cf643809b79b707fd94bc77364cbe
SHA512bf50a72a9789168ddc70ab5ebf2176a450108bc5aff7e07247ab0acc3c9b2284f0b6c76a9043cb29af9f73e5138e89a888f1058c2627abc7396e71d30a07564d
-
Filesize
6KB
MD57c71389c12a8fcafec76d2eabdcc8a0b
SHA1faa4cb832103884bdd5da7a7b00ffea76f5a6aa1
SHA2567baa2c4199421e067dab3adf026e055d8f5f5e732751ba0451f8c3d4157bffbc
SHA512954712e27aba6294f6b6eba8d839277facee9c1dcfb70d8e978964e5dbebf6c06b02939c623872b487ac01aea0c86bc9ede57ca0c5d0a5bf5f31a00a95d2fc7e
-
Filesize
6KB
MD54db4b662646203776c40646366b27654
SHA1dede58aad6f43738f2057e70fdd42547b834edd4
SHA256af91432c39007d015b8a21ebf975680fb94e09fb4b2dbb1a82863888a2e40bb4
SHA512714e1944e5eeb6816457f198b36c7f8dfbd0f79059dd8429707c256b505bb41b4ab9e4a830549884406ba050d3a212c01f429f66f3924128da75491f0ae6c3dc
-
Filesize
864B
MD5d254bbbbb508e92e9f068033b910661e
SHA164dcba6da708772efeaa0a3ff1f81f8eb7db120f
SHA2560b82fd450c13dc444837917ab0aaafc4c651982575d13cf34fc1a55333316ee9
SHA51255e4f75dcbdced9bcc4197f199d6e20512372908376721af008d3981078bdcef4d7286af65fa2dcdd374ad0a18157e991853313bebe46a16a45b0b9b627e3a28
-
Filesize
864B
MD53f7f99b689766da75973c91c0f44b9ab
SHA1ead2fc32794067946e7c149d517d439495b376c5
SHA2560637510d76a371e192d7015577377f05097aac0bcf491255b3c5466f993a54b3
SHA5126bbf3ffa3b063dfe2ce98d300bedf6d9bfdecef081ad94c6677e29762fbdc66f58423ed7a9f015bb611b296353727be56e59eb134075cade2c50751c77025bbc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56bd9504b5bc7f1396bd98e3ce7d23c68
SHA1c4881dcb241ead3734371acd9f40105bcc9243dd
SHA25633719dca64f44a82822f0654c664430c9f93603d7a988f8fd17fb4c2f619c42b
SHA5124aebe1da786ed450414ef3b3da8e5d62204dd1541c523e7d53fb95188923c3c7b09e46dd9f04b435c9ce9bb884ab485af358a8123e7d5395767ef89e542e4e95