Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 04:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://172.253.115.138/
Resource
win10v2004-20240704-en
General
-
Target
http://172.253.115.138/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2728 msedge.exe 2728 msedge.exe 1720 msedge.exe 1720 msedge.exe 3000 identity_helper.exe 3000 identity_helper.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1720 wrote to memory of 4024 1720 msedge.exe 82 PID 1720 wrote to memory of 4024 1720 msedge.exe 82 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 4984 1720 msedge.exe 83 PID 1720 wrote to memory of 2728 1720 msedge.exe 84 PID 1720 wrote to memory of 2728 1720 msedge.exe 84 PID 1720 wrote to memory of 4892 1720 msedge.exe 85 PID 1720 wrote to memory of 4892 1720 msedge.exe 85 PID 1720 wrote to memory of 4892 1720 msedge.exe 85 PID 1720 wrote to memory of 4892 1720 msedge.exe 85 PID 1720 wrote to memory of 4892 1720 msedge.exe 85 PID 1720 wrote to memory of 4892 1720 msedge.exe 85 PID 1720 wrote to memory of 4892 1720 msedge.exe 85 PID 1720 wrote to memory of 4892 1720 msedge.exe 85 PID 1720 wrote to memory of 4892 1720 msedge.exe 85 PID 1720 wrote to memory of 4892 1720 msedge.exe 85 PID 1720 wrote to memory of 4892 1720 msedge.exe 85 PID 1720 wrote to memory of 4892 1720 msedge.exe 85 PID 1720 wrote to memory of 4892 1720 msedge.exe 85 PID 1720 wrote to memory of 4892 1720 msedge.exe 85 PID 1720 wrote to memory of 4892 1720 msedge.exe 85 PID 1720 wrote to memory of 4892 1720 msedge.exe 85 PID 1720 wrote to memory of 4892 1720 msedge.exe 85 PID 1720 wrote to memory of 4892 1720 msedge.exe 85 PID 1720 wrote to memory of 4892 1720 msedge.exe 85 PID 1720 wrote to memory of 4892 1720 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://172.253.115.138/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd0c2746f8,0x7ffd0c274708,0x7ffd0c2747182⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,15015743209947268929,957654722776100735,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,15015743209947268929,957654722776100735,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,15015743209947268929,957654722776100735,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15015743209947268929,957654722776100735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15015743209947268929,957654722776100735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15015743209947268929,957654722776100735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15015743209947268929,957654722776100735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,15015743209947268929,957654722776100735,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,15015743209947268929,957654722776100735,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15015743209947268929,957654722776100735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15015743209947268929,957654722776100735,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15015743209947268929,957654722776100735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15015743209947268929,957654722776100735,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,15015743209947268929,957654722776100735,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4664 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1072
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e1fe3a26bd35b84102bb4203f31e74c7
SHA145fdfa8433789b575eb64e116718e62e0e0cf4a0
SHA25626e0d51529de906dd285ba48288e25eaf5213c0f0bab9bc5f119ecbc5e1b93ee
SHA512d528db2e9b917d4fbe24b1b5c6f4cb274f4f91c84f63e5119e041fa89ae0cd01a370e314f8b6aca9d6fa958e79feabc720f4b54b3d8aed69aab11fa84cad36bd
-
Filesize
152B
MD52915233ace3b11bc8898c958f245aa9a
SHA168c6aa983da303b825d656ac3284081db682f702
SHA256b2cb442f2ca27619c8df087f56fcbbb53186c53f8fd131af886ee3712220477e
SHA512e3f1b70d39b615e212f84d587ee816598236ee6ce144d919593894fcce4a0900343a9e8b837a0d1bd10921fff1c976c84c4a570eda776fe84d374a69e7a54890
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD52fa563693595091383bd9f297b8a08f9
SHA11cdd8670e9391d3b97d0cd0cfd94a34a5a14a365
SHA25666f7fe8608c7bb7ba329ce1694e9541ebf734f3091fcc5d4357ca3eec8af91b3
SHA512af64d57cc97a53c12033f160757cc618d05ae2acaa7183bf96cecac86914c360dc303f9fb5c28ecced9d4b3b0238275b265be43f64deb479165b8fd158eb5d89
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD53dbd7e66d3987d3e86bb071e946fc833
SHA119999605edbb4316e27ab0db607ee1ce2350b188
SHA256a86c60762e7124feaac2e10c90c469a8dfc277637aac04fdedd4a4d002486368
SHA51229f2487319282255a1550a577e411f843e69ac27f32fec3d7bf7c05f01cd36614b5429f182d5f39f34b3afdb6d0218dd4390e9a0f88c8bde6f676b2833e29621
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD577f0e615cc1f45627f0ab2d8efff82c8
SHA196df5a1d101afb167ccdb5a394c0ae33cfab8aba
SHA256d7bc852d1a7ce5bf81bf804d448947929094739d668105d40a512b039cfb3b19
SHA512c327f0c7ea1be45680c2920b111cfee8817531f29f47dab707db24b1ce5a97052a5958a4e7e236d4855000455883df646eac74cdb43dc94f95501684b8ceb87d
-
Filesize
815B
MD5eda4cff1333ada3b5f2a8525d51193cf
SHA1f3f5b7fae68ece8e209abfe324d662f739343f26
SHA256090919c6aa24a962426117acbdcf5ac9b64412121886e58ba8ef54bb7c24f8e7
SHA51299631e35cd47cd9dc72117c8ee05395fe8c4226c473aa64a653ed9a2eb9b374ee1aa724d8d3c76ce4c1f2b195aac05c68368ad8410b87affb4bb913ded8af605
-
Filesize
6KB
MD58fa5526039787c89220977be657b2847
SHA1325d2475cfbc6281e1ccad15470e3b96a9c44713
SHA2560602d60acb3b5d1f4294d10cc8025af071f8fff4c510af20ca1add9f3c64134d
SHA512c03ce8738a34727b2f609ff44a8ec904db151e3d838143f453875a993cf9e927f4e6a44454b16e7f316b50bb9ff79017d5311b65fa5572e4a77cd9bda624dc9c
-
Filesize
6KB
MD54efe8987ce89f699adb54e56f53ae1bf
SHA1deeb5319d690b1d6421c6c635034e8d28e263dbc
SHA256ff26685520fc71f55c00bc8f158b61cca4e7e54211be9993e9cb1ab6dae6e032
SHA51218e314cc886943f2c53b3002e5ff6bcb24545d9cdf2702e81bd3e1a55accebc9b03d57b1eff35162e99685e51e89aef598a2283ce4755c4f33e02470b2f9cb07
-
Filesize
6KB
MD55aa894364d0946575c43753b3a68c0a0
SHA171c3ece505f51b95bcb938712cf645c814321d8c
SHA2560dfd67b8bec62bdc8a5c24dfa46accb5bea12d65b02bb40cd1f906a542e565dd
SHA512b9a7887663ad4c52b9adfca342b4d0b25732bf3f937855250bbc2a194918b76ba0e565d35feff0049415ed0af73a4ad218998c9c7a3ec74b24aaefb894d9a03a
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD58fd16ef488139fa46047519175b0cc9d
SHA1ddf3fdb2d54ba0ae1b2bc07aa13b1ce4995d3fc8
SHA2565cd78bf2d19f3ae8b3898e181627efc5810aa79f058ca57a83ed77c00d78eb23
SHA5128bcf6f0f545f6b6e016ed6053834ed2aa3113dea72483083fb01bb52573443145e22828b261551df64d7b1db18d23847009ddda1bbd864318b3d6aa32bd0c2c9
-
Filesize
11KB
MD555eb3bb426b7563d24d8c9d6b694c261
SHA142c8c76c2e1f96fc79770b513cbd2112569b27b4
SHA2562ecf798bc57bd3648e6553cc2ebfed953d0cf849aeaa6a86785aab25b788d42d
SHA5127eda59c4d785da741a2dd6407ca7f9a74786058012ae04ff0619965c5084f3db20760073eb4038b2858db040ad02746c6e4ca47c1c4fb9b59ae7124cdd432f15