Analysis
-
max time kernel
157s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
e242b70fe93c46ad637f3f5647c7a502.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e242b70fe93c46ad637f3f5647c7a502.html
Resource
win10v2004-20240226-en
General
-
Target
e242b70fe93c46ad637f3f5647c7a502.html
-
Size
59KB
-
MD5
e242b70fe93c46ad637f3f5647c7a502
-
SHA1
d325c8e34457a29495c4f9857058569772c7da00
-
SHA256
e6adc43b4d80455ed7d709044a532d0501065a3ee6be054b0e77c41c7a764011
-
SHA512
ec2d6a7505673ef0604d08619d968da802227a138efc0996fad9ad7067bcc8f74c9c874705fb6621ea782150d7a99c5fd56196476d419778283bbd7046ab9863
-
SSDEEP
768:/KipoLasx4C7cTVpBg9tlsMTATqY6H65JdqQweBmL9ekaWjE0xR/kdF42SAjb+fl:/KdLasgpBg9tlsxqRH65JHmLQmJkdFJ+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 760 msedge.exe 760 msedge.exe 1644 msedge.exe 1644 msedge.exe 3364 identity_helper.exe 3364 identity_helper.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1644 wrote to memory of 4488 1644 msedge.exe 85 PID 1644 wrote to memory of 4488 1644 msedge.exe 85 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 3312 1644 msedge.exe 86 PID 1644 wrote to memory of 760 1644 msedge.exe 87 PID 1644 wrote to memory of 760 1644 msedge.exe 87 PID 1644 wrote to memory of 1992 1644 msedge.exe 88 PID 1644 wrote to memory of 1992 1644 msedge.exe 88 PID 1644 wrote to memory of 1992 1644 msedge.exe 88 PID 1644 wrote to memory of 1992 1644 msedge.exe 88 PID 1644 wrote to memory of 1992 1644 msedge.exe 88 PID 1644 wrote to memory of 1992 1644 msedge.exe 88 PID 1644 wrote to memory of 1992 1644 msedge.exe 88 PID 1644 wrote to memory of 1992 1644 msedge.exe 88 PID 1644 wrote to memory of 1992 1644 msedge.exe 88 PID 1644 wrote to memory of 1992 1644 msedge.exe 88 PID 1644 wrote to memory of 1992 1644 msedge.exe 88 PID 1644 wrote to memory of 1992 1644 msedge.exe 88 PID 1644 wrote to memory of 1992 1644 msedge.exe 88 PID 1644 wrote to memory of 1992 1644 msedge.exe 88 PID 1644 wrote to memory of 1992 1644 msedge.exe 88 PID 1644 wrote to memory of 1992 1644 msedge.exe 88 PID 1644 wrote to memory of 1992 1644 msedge.exe 88 PID 1644 wrote to memory of 1992 1644 msedge.exe 88 PID 1644 wrote to memory of 1992 1644 msedge.exe 88 PID 1644 wrote to memory of 1992 1644 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e242b70fe93c46ad637f3f5647c7a502.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe946746f8,0x7ffe94674708,0x7ffe946747182⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,2656496771810996177,7360623617591793139,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,2656496771810996177,7360623617591793139,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,2656496771810996177,7360623617591793139,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2656496771810996177,7360623617591793139,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2656496771810996177,7360623617591793139,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2656496771810996177,7360623617591793139,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2656496771810996177,7360623617591793139,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2656496771810996177,7360623617591793139,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2656496771810996177,7360623617591793139,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2656496771810996177,7360623617591793139,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6196 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,2656496771810996177,7360623617591793139,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6176 /prefetch:82⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,2656496771810996177,7360623617591793139,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2656496771810996177,7360623617591793139,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2656496771810996177,7360623617591793139,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,2656496771810996177,7360623617591793139,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3996 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD536bb45cb1262fcfcab1e3e7960784eaa
SHA1ab0e15841b027632c9e1b0a47d3dec42162fc637
SHA2567c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae
SHA51202c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456
-
Filesize
152B
MD51e3dc6a82a2cb341f7c9feeaf53f466f
SHA1915decb72e1f86e14114f14ac9bfd9ba198fdfce
SHA256a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c
SHA5120a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5a766de9194159a949fbacc6a1c78993c
SHA15bccf8ca20c2951a80a05fb56c474e98f40b07c6
SHA256c5a80e9677a65970f2dbabadfa2ceae8d7ccebb0441e02cd652f4f2de304cb72
SHA512137de6e5b3f8b80c2617a50758083872688bdd22d46b9a70f459ccab5caf27c44e5149689ccb3d8015827c2fd7b303787d4de2233113142b7a8ad84c100db5fb
-
Filesize
1KB
MD546a601f8c99520d01ed5e0618bfb719f
SHA116179eb89453c8a3ec5e0cad1b8e3437b3b89943
SHA256b93651c62e36348369c9beb2c9b8cf8915d5bdf8b6df97229f1b5eeb970f42a0
SHA512913c354956f93ad53dc429fcbbeecc5d8f4778fb05da1652a34cc087fdec8599be7f15ec426b1dc6d68cc778873885298dd4e3f64169e9421986770abfc5b37b
-
Filesize
6KB
MD5c928347446452928b908f9672e3ae770
SHA12e69771942e5611bc17eb6d3ed9c9dda34e15c2b
SHA2568cf802191c9823829f8fccb1efe8d142931bd62512d4b5cde82173f1eb612418
SHA512ee581e3b24ffecc02c1bc29944d2028e8db8cc6e8dc792822c8df16d6db1117ad2363ebfcbf6c6b6a08f2b9b2c9d1d6b9b5159fcbca634770ffddc9c475a136d
-
Filesize
6KB
MD5c2cbaf826a334185251e353749f3ccc8
SHA1cc7cbeead4c4ec8f49b720de2718bbdebb68d210
SHA256bb93de29eccaf6caed52ff2da24b83b0827f51889d091d3d625d7cf3adc48f82
SHA512b5d62837319ffdb81815548b6c716075c959e056ca67abc5f7bad32110d1ff560b2e33c6aa93a913e5ca45501b81c8c64726ec85b8059c2b8d1886c9b5e43a7f
-
Filesize
6KB
MD55ac597f120a43edec2162b92ecbe090c
SHA154ab7c68e0669dd01e5338916621b8a50ebdfbd5
SHA256285cc9407b0453154ae15cfb1d934eb36fc9cfac36993353491f1e11b03515ee
SHA512402bd9ebe8335a4cd187f5cbe273114f4216345da922e8ec4df217e25e257b357edf4fa57e0fb61e507533b12a4830c7c4e8d6de49cfca60a602404dea2c8eac
-
Filesize
7KB
MD5643a016522a891e55d3e0da94b6d9f53
SHA1b374f569e8e1b54e6ce69dc030bfbef31edf36fd
SHA2564b4d4542a59a5a37bef254ab9817fa5d0cd14c89cf64a4b016f4ed685e21d514
SHA512aa5a4b2d26a0e8e7c249c3c6565948813fe88daaa0096db6bd54fb83db5b0e0b03749fdf41cf8da106ea6b3f6dcc9f6bc4575a29413dc71079eba301980d9bc1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57e741ea6777985ead8f20cd7dc0b2d4f
SHA129dca8e6264b081217cd09bb153c1aa53382e6ca
SHA25636dbc7f6e82e6aa7553e2d9a3befbf8fd7eb6f40c9ba94ac8f688719d1b52d2e
SHA5123731b9580d9f45fbeadad9aac6d7cab9e32301de91ef788329de38677f764bd91b9d7a20d66dbc69b5d86a2281e7b30f094f0c0e99efdfb9b710529726525667
-
Filesize
11KB
MD5396b198a4481a6e3ea0a4ecba2ac7b52
SHA11b28aaafc627cae4ed740c70a59eb05fc20bd8f4
SHA2560b573ceb8348154bbcf26663234be6f2775f71cdb1f6302d3b8e0b2c9bd191b2
SHA5127bc1baff710f1306feecf0719d0ff54c3cc6f2db4348876282557e9f7465c910184ce89dde2f2d108dca58b7f3203feed584a05ff3c95329fa5ded53c9d4a357