Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 04:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://url.uk.m.mimecastprotect.com/s/mHUiCmQ0WfRqE6PUGfxCR4LKj?domain=doc9987rr8.s3-website-us-east-1.amazonaws.com
Resource
win10v2004-20240802-en
General
-
Target
https://url.uk.m.mimecastprotect.com/s/mHUiCmQ0WfRqE6PUGfxCR4LKj?domain=doc9987rr8.s3-website-us-east-1.amazonaws.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 732 msedge.exe 732 msedge.exe 2928 msedge.exe 2928 msedge.exe 3212 identity_helper.exe 3212 identity_helper.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1648 2928 msedge.exe 82 PID 2928 wrote to memory of 1648 2928 msedge.exe 82 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 1480 2928 msedge.exe 83 PID 2928 wrote to memory of 732 2928 msedge.exe 84 PID 2928 wrote to memory of 732 2928 msedge.exe 84 PID 2928 wrote to memory of 1920 2928 msedge.exe 85 PID 2928 wrote to memory of 1920 2928 msedge.exe 85 PID 2928 wrote to memory of 1920 2928 msedge.exe 85 PID 2928 wrote to memory of 1920 2928 msedge.exe 85 PID 2928 wrote to memory of 1920 2928 msedge.exe 85 PID 2928 wrote to memory of 1920 2928 msedge.exe 85 PID 2928 wrote to memory of 1920 2928 msedge.exe 85 PID 2928 wrote to memory of 1920 2928 msedge.exe 85 PID 2928 wrote to memory of 1920 2928 msedge.exe 85 PID 2928 wrote to memory of 1920 2928 msedge.exe 85 PID 2928 wrote to memory of 1920 2928 msedge.exe 85 PID 2928 wrote to memory of 1920 2928 msedge.exe 85 PID 2928 wrote to memory of 1920 2928 msedge.exe 85 PID 2928 wrote to memory of 1920 2928 msedge.exe 85 PID 2928 wrote to memory of 1920 2928 msedge.exe 85 PID 2928 wrote to memory of 1920 2928 msedge.exe 85 PID 2928 wrote to memory of 1920 2928 msedge.exe 85 PID 2928 wrote to memory of 1920 2928 msedge.exe 85 PID 2928 wrote to memory of 1920 2928 msedge.exe 85 PID 2928 wrote to memory of 1920 2928 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://url.uk.m.mimecastprotect.com/s/mHUiCmQ0WfRqE6PUGfxCR4LKj?domain=doc9987rr8.s3-website-us-east-1.amazonaws.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9dba846f8,0x7ff9dba84708,0x7ff9dba847182⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2284,3579118061368563685,4195714980813644672,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2312 /prefetch:22⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2284,3579118061368563685,4195714980813644672,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2284,3579118061368563685,4195714980813644672,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,3579118061368563685,4195714980813644672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,3579118061368563685,4195714980813644672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2284,3579118061368563685,4195714980813644672,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2284,3579118061368563685,4195714980813644672,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,3579118061368563685,4195714980813644672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,3579118061368563685,4195714980813644672,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,3579118061368563685,4195714980813644672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,3579118061368563685,4195714980813644672,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,3579118061368563685,4195714980813644672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,3579118061368563685,4195714980813644672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,3579118061368563685,4195714980813644672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2284,3579118061368563685,4195714980813644672,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5de9f2ab99bf93d9c0944b49b4702fe91
SHA1a95259572942f0110eac33056456cb86e3febfed
SHA2565c2db54acdbb9c448766925da83e2b249633d84c73a722e66766897351e4c348
SHA512ed3c2072913069eb48eb979d9dc076947833cc043516916ebe23e2cccb91d82b3a35380fef21024065eb837a2d71b8c6173b33347b59fbe2cf94176206e7150d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD567a23017dc301b18d99c6a11fe6c03a5
SHA161f61228e2cfa38e67847780a046198137bdcefa
SHA2568f2c32f6cc48de71355cabc318b3b70a9a927c63de040d08ba38eb2bd672738d
SHA51248c9ad9d85e997b8f9244028b37abe680f35beaaa2d347143d218551a3d4c181158d2dd4513ff6c01393abf0c87e7e7fe41dfe76f726f33dee8e1586c56d86d9
-
Filesize
643B
MD5e6417ccaf60abe7ab333467dbf345d06
SHA1d0c7560f3eb0174b2ed3667c22fa96bdcfdf2e5c
SHA2563415777a422bf93f6b34a3249e4ebb658336cb659f5f7a638b4471089a27dc43
SHA512b224884a11f46e5ddcebbc7295a8b3ea84ca5768f6b69f0d04b5ab0dcccf4f35715d20f1e9be7bfc663f9a291feea77161f103fc940ac3859ad53f58e8efc6da
-
Filesize
6KB
MD5e26d406ccdaa1e1be22702ba62c6cf9c
SHA1a031d25acfff014863c8f171fac9b5e3ef04e898
SHA256d46eddae5d071e8dc6752162f5a82e6183088e64d87b86ff2ef9feaf86dfd7c5
SHA5121755056ec6028e517ea9cb142f40de1ddcc3dfea90f03fea5dd57f54b0c333673e65d9ee04efd7659a351f76087bf71f49a2e97bc0a62e2a7b0e8870fb5aec70
-
Filesize
5KB
MD55d24da6df2bd2d62fbd1f2790ef3959b
SHA1c20e89d0b4f6416c64cda35214f5b901e5b2e5f1
SHA2565618e609d82112fcc22aa6dc0a5f93f674809b0e2fa3bc45b1f83fdaec7e3f03
SHA5128d092be9f96454e7ee46b1cc5da4091d9a61da09ac1780e42a30139e534a804b7dfafca0ad12c397da261d398e633c68d4f022bd6df04b500c428c6207b2c1e6
-
Filesize
6KB
MD58ab40e141fffc8b97c5ff65c2622a6d9
SHA1b01598ebb187c87ba38865a94ae7e9a23dab81e2
SHA256b80649b53ee0f44ecfbee4e76591d89a15d0c37dc3e31ce9cdf2b987849d007f
SHA5129b342d989218809fd46b391e7115d1c984bd6a2fe07497a558db4830c7cea4579b4d2f37ec6f254eef7626729ec1f166a825e400468e3b00fa871824f80a67b9
-
Filesize
705B
MD5ea21e715c48b7541169f2feac1adfd28
SHA1f2aa6f7136ab82030c6a1e95c1e161735a1397c2
SHA256677d9343d4c6839889dcb9055f8a3d9c5d3f72954550164910db302bfd869782
SHA512f8a89d273b70d0b56a93e66df6a4228c9178969c24f168ac804476472a0702478d2c5e2b364e64953a3a17aee416fd64c89354f3eac1348648c776a985202e18
-
Filesize
370B
MD536bc58869496b93b6c83ecf87684cb93
SHA119d100d5b2d37913763aef81de6e756077cc3367
SHA2565d7d0ac81b40ae041dc700811e415f56b2acfb14f107fd14862e3035d2849c95
SHA512e2d13c7fc05014ff521adc0fa98a4766a1826e22b2c47077aa16d4202894251e9ab52a10738dd59da5af510f4029da4f72e73d98ad967ea66b884f73619d579b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55d3078c7ab57ffb9ebf4855cb14d2a3c
SHA1e8b0177ed7ee62caf28b088f522621a4c609e136
SHA256f84a3a29c7f9fa1d1aeb0d2f64418ab189e8037174a883777be9e0c449ac699c
SHA5121bb55a7c0d42d1a40636d6e23f55726ed1b6dc4bbd92b11bcf304871221ebac44847eea39d548fb65eb80183919441eb977f2bac304869609bb37905e3039198