Analysis
-
max time kernel
29s -
max time network
30s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/08/2024, 13:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://doomsdayclient.com/
Resource
win11-20240802-en
General
-
Target
https://doomsdayclient.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3007475212-2160282277-2943627620-1000\{FC1F260B-C2E1-4B17-BE2B-7DFC24EAD219} msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 228 msedge.exe 228 msedge.exe 4272 msedge.exe 4272 msedge.exe 1676 msedge.exe 1676 msedge.exe 3408 identity_helper.exe 3408 identity_helper.exe 648 msedge.exe 648 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4272 wrote to memory of 3216 4272 msedge.exe 82 PID 4272 wrote to memory of 3216 4272 msedge.exe 82 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 3692 4272 msedge.exe 84 PID 4272 wrote to memory of 228 4272 msedge.exe 85 PID 4272 wrote to memory of 228 4272 msedge.exe 85 PID 4272 wrote to memory of 2000 4272 msedge.exe 86 PID 4272 wrote to memory of 2000 4272 msedge.exe 86 PID 4272 wrote to memory of 2000 4272 msedge.exe 86 PID 4272 wrote to memory of 2000 4272 msedge.exe 86 PID 4272 wrote to memory of 2000 4272 msedge.exe 86 PID 4272 wrote to memory of 2000 4272 msedge.exe 86 PID 4272 wrote to memory of 2000 4272 msedge.exe 86 PID 4272 wrote to memory of 2000 4272 msedge.exe 86 PID 4272 wrote to memory of 2000 4272 msedge.exe 86 PID 4272 wrote to memory of 2000 4272 msedge.exe 86 PID 4272 wrote to memory of 2000 4272 msedge.exe 86 PID 4272 wrote to memory of 2000 4272 msedge.exe 86 PID 4272 wrote to memory of 2000 4272 msedge.exe 86 PID 4272 wrote to memory of 2000 4272 msedge.exe 86 PID 4272 wrote to memory of 2000 4272 msedge.exe 86 PID 4272 wrote to memory of 2000 4272 msedge.exe 86 PID 4272 wrote to memory of 2000 4272 msedge.exe 86 PID 4272 wrote to memory of 2000 4272 msedge.exe 86 PID 4272 wrote to memory of 2000 4272 msedge.exe 86 PID 4272 wrote to memory of 2000 4272 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://doomsdayclient.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff836f43cb8,0x7ff836f43cc8,0x7ff836f43cd82⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6124 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,6640434632565833357,2777105907546594867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4876
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b4ae6009e2df12ce252d03722e8f4288
SHA144de96f65d69cbae416767040f887f68f8035928
SHA2567778069a1493fdb62e6326ba673f03d9a8f46bc0eea949aabbbbc00dcdaddf9d
SHA512bb810721e52c77793993470692bb2aab0466f13ed4576e4f4cfa6bc5fcfc59c13552299feb6dfd9642ea07b19a5513d90d0698d09ca1d15e0598133929c05fe1
-
Filesize
152B
MD54bf4b59c3deb1688a480f8e56aab059d
SHA1612c83e7027b3bfb0e9d2c9efad43c5318e731bb
SHA256867ab488aa793057395e9c10f237603cfb180689298871cdf0511132f9628c82
SHA5122ec6c89f9653f810e9f80f532abaff2a3c0276f6d299dce1b1eadf6a59e8072ed601a4f9835db25d4d2610482a00dd5a0852d0ef828678f5c5ed33fe64dddca9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5e951a3c1cead39b1ef2cc3a6b5db0354
SHA156578dd4272edc5d03242894e69bada240610e5d
SHA2566851e25037e49988d91088c0eef4c3f71b9bef7bae22e1368e8662343432eee7
SHA512d58984e1adbb25e4fc004a56058963a737d030f78e78950f027ea5617acd9977609c6a188597768bc045a40fe4170fc51d2eb8b338d5383e88218669271575c9
-
Filesize
5KB
MD54e4abf9202493b85bc6ac64d2a91a683
SHA13cbd0ac829c00de9de75fb1c3701315de1230bef
SHA2569ab27c884a577945ea1a27f71297a1a91fbc07b5d09b6c834f7fc3365bf0e546
SHA512bff89527129392e7c699a3fe03fb35fb92f8d01c4005fabef23c61cc056c304eb68f956014cce9943a4105dc73353679638649f531e540505c354ec04e3e9f1e
-
Filesize
6KB
MD55bd48085f4aa6e496dfa33bb772c29f0
SHA17843a34029172af9cd7d37ca3de0b8dde116ea01
SHA256a30076cac4950da207d94996cd13b9ce25bad291401311b7309af8fc4236cda6
SHA51204a70ebcbee197ca56d653b38783bb13a9e13cfc677059f9911c091c570523be6aa45524ba7e4fa804024951c5b34da8fe04f4cdef6c998b31496b4fe746a6a3
-
Filesize
6KB
MD58c46d26f18b5b0c629b09620036bf5b7
SHA11cb552170fe1d5c454c8c2101e5938607ffdcf42
SHA256f5753e49cc315d314328b404d0711d35ba7b49c9d1e97a8a8e38b9b5a1580606
SHA512523992304f90dc3492be63dba262c2788d3f311556476362386cb64c56e7dea124466fe9aaf72f260d8ebbae34090b532369a4de15bf11f8c76eabeaa28c4986
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD509bb4f4a39e946eef422d92e67ddbbf3
SHA17a3e2c63f93d253290ae3b54614353872af1095a
SHA256ca7be604eb54982fe742931450ef6589b5dfecb8506da124b323c05809362a4c
SHA5124f1e88e77dd5c163c02997336ff0ae94e97d429f729680513dbf893b535d5094835de1b7f39540428d7c5248ad94306bae1c5a0724e6598a2c724084aa8f15ed