Resubmissions
28-10-2024 19:44
241028-yfzzwswbnl 319-09-2024 17:46
240919-wcq7gasarn 314-09-2024 23:25
240914-3egt5sshjc 629-08-2024 08:30
240829-kd8mcs1hph 929-08-2024 08:05
240829-jy9jqashqp 329-08-2024 07:45
240829-jlqabasell 329-08-2024 07:24
240829-h8gq1szblh 329-08-2024 02:45
240829-c8p5hazemc 327-08-2024 21:54
240827-1sjjsatcmf 826-08-2024 22:44
240826-2nwtzs1brm 6Analysis
-
max time kernel
480s -
max time network
600s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 21:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/8zdVADbQ#zgBChae6OAWDlXIIXvyN2uTShbQUcxQkIfMD9eQhdQM
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
https://mega.nz/file/8zdVADbQ#zgBChae6OAWDlXIIXvyN2uTShbQUcxQkIfMD9eQhdQM
Resource
win11-20240802-en
General
-
Target
https://mega.nz/file/8zdVADbQ#zgBChae6OAWDlXIIXvyN2uTShbQUcxQkIfMD9eQhdQM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 5008 msedge.exe 5008 msedge.exe 4300 identity_helper.exe 4300 identity_helper.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 1364 5008 msedge.exe 83 PID 5008 wrote to memory of 1364 5008 msedge.exe 83 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 3800 5008 msedge.exe 84 PID 5008 wrote to memory of 4080 5008 msedge.exe 85 PID 5008 wrote to memory of 4080 5008 msedge.exe 85 PID 5008 wrote to memory of 2004 5008 msedge.exe 86 PID 5008 wrote to memory of 2004 5008 msedge.exe 86 PID 5008 wrote to memory of 2004 5008 msedge.exe 86 PID 5008 wrote to memory of 2004 5008 msedge.exe 86 PID 5008 wrote to memory of 2004 5008 msedge.exe 86 PID 5008 wrote to memory of 2004 5008 msedge.exe 86 PID 5008 wrote to memory of 2004 5008 msedge.exe 86 PID 5008 wrote to memory of 2004 5008 msedge.exe 86 PID 5008 wrote to memory of 2004 5008 msedge.exe 86 PID 5008 wrote to memory of 2004 5008 msedge.exe 86 PID 5008 wrote to memory of 2004 5008 msedge.exe 86 PID 5008 wrote to memory of 2004 5008 msedge.exe 86 PID 5008 wrote to memory of 2004 5008 msedge.exe 86 PID 5008 wrote to memory of 2004 5008 msedge.exe 86 PID 5008 wrote to memory of 2004 5008 msedge.exe 86 PID 5008 wrote to memory of 2004 5008 msedge.exe 86 PID 5008 wrote to memory of 2004 5008 msedge.exe 86 PID 5008 wrote to memory of 2004 5008 msedge.exe 86 PID 5008 wrote to memory of 2004 5008 msedge.exe 86 PID 5008 wrote to memory of 2004 5008 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mega.nz/file/8zdVADbQ#zgBChae6OAWDlXIIXvyN2uTShbQUcxQkIfMD9eQhdQM1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0d7746f8,0x7ffa0d774708,0x7ffa0d7747182⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9950324895147347553,4554873197295128994,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,9950324895147347553,4554873197295128994,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,9950324895147347553,4554873197295128994,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9950324895147347553,4554873197295128994,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9950324895147347553,4554873197295128994,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9950324895147347553,4554873197295128994,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9950324895147347553,4554873197295128994,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9950324895147347553,4554873197295128994,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9950324895147347553,4554873197295128994,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9950324895147347553,4554873197295128994,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9950324895147347553,4554873197295128994,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9950324895147347553,4554873197295128994,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2328
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\40c8feb4-10a1-4c82-84b0-1b8ab461f5d0.tmp
Filesize5KB
MD54e5f3cfea053411b7e581a160975ff40
SHA1264b8777d761a26d0f6befaff739f7c6d0793e5e
SHA256c8e1c65084db072792636007f912f94ba28f087f4b89dcda0d6748294b7eb79b
SHA5121c44edacba53b3c0a740484c25cc9d10579882e1166159da753841b4d06ce52f048f4f9369090d70182ae0919928abfa2b2a80f05b3df60a244625d86487b413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5e1c315f2a3b848fded5f1eefbf8551e4
SHA1fc4fdd3805f4a7625398ba863eaa9401ed361011
SHA2565e217aca6d969e8ee42baeeb91940661b21bb7149f70d80993c98ad4134e134a
SHA512b63c9a860228e42590e5eb50c2c7240ca290c7cf0ecda2826825a7999bd6410acd5b0ad6df76e5d84ed7932c1c707219a762670868dd2bd337a20c39b382d484
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
188B
MD5008114e1a1a614b35e8a7515da0f3783
SHA13c390d38126c7328a8d7e4a72d5848ac9f96549b
SHA2567301b76033c2970e61bab5eaddaff5aa652c39db5c0ea5632814f989716a1d18
SHA512a202fc891eace003c346bad7e5d2c73dadf9591d5ce950395ff4b63cc2866b17e02bd3f0ad92749df033a936685851455bcdbfad30f26e765c3c89d3309cb82b
-
Filesize
6KB
MD5e57b39eb8ecdadd76aa707a883c44927
SHA1522118fa7201ffe083459eaa426d8258fd584ea5
SHA256506fce1824b7f7ec80d2c12cc5722817d6a9d2e14503ded44b28dccd0f3c0cca
SHA512fc2a9a3cd8d1328d409c999ceac5268459e5493bb8561ee7113186277d473e887c872abd85fc5688f173b431c4787b99189b132f20d6f556e6a59b3e31ca017b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5e80eae54621403681380e1956bbaf8f0
SHA14e3b3bade0a3cf7533d1849f3650131d758a6a9d
SHA2566ef4a76219b4f4fb05e470ffc585980b1adf3f419ee333cf65959e97928d580f
SHA512666279afc6828506250d86b801a2ff847461557278ac0f29313d84bd2386cd6eab460097cb02baa0d9e9eefef8a1e6941b4e88b0b02acea72ef4eae472467a16
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe582882.TMP
Filesize48B
MD5481e9192ddb984e311576e3f2d03eab3
SHA18ad6a515942402ff01438680515def05eaf07abc
SHA256a8289aeeeab59ba5be9ab343af216656b180922520049265dd1b37dd6bd54e8f
SHA5128fb1358eb93b458c8ed7150f8a9060bb4167b6321ec4e9e61a8b66f40e04f586052a8f8b8631c93c80f81efac06c07ec50ac182caec95dd6cdfa5c86355838b5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e32086012d020e1fe5ff1516289f3068
SHA19df5fa71e2f0af3800ed037d9caefee373a9dbc8
SHA256439ab9d486ef072523d19462e9b090bbb31f405f85d678fad578f383c8dffad8
SHA51280e4e0888a4da0a1716ba9ed1e63a95f07910607bb6b4609f2065cef0d7348ddc5456e67f4bf040a7edbe7fb59552b34868a806a9de7849343fb581995b85980