Analysis
-
max time kernel
25s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 18:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1289278308940255302/1289285482609643601/guns.rbxm?ex=66f8442c&is=66f6f2ac&hm=c865e967af7298fed0c71a55201a779fdd2571e4a42cf85927062785920ef673&
Resource
win10v2004-20240802-en
General
-
Target
https://cdn.discordapp.com/attachments/1289278308940255302/1289285482609643601/guns.rbxm?ex=66f8442c&is=66f6f2ac&hm=c865e967af7298fed0c71a55201a779fdd2571e4a42cf85927062785920ef673&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1472 msedge.exe 1472 msedge.exe 680 msedge.exe 680 msedge.exe 3836 identity_helper.exe 3836 identity_helper.exe 3368 msedge.exe 3368 msedge.exe 5600 msedge.exe 5600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4476 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 680 wrote to memory of 1372 680 msedge.exe 83 PID 680 wrote to memory of 1372 680 msedge.exe 83 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1452 680 msedge.exe 84 PID 680 wrote to memory of 1472 680 msedge.exe 85 PID 680 wrote to memory of 1472 680 msedge.exe 85 PID 680 wrote to memory of 5088 680 msedge.exe 86 PID 680 wrote to memory of 5088 680 msedge.exe 86 PID 680 wrote to memory of 5088 680 msedge.exe 86 PID 680 wrote to memory of 5088 680 msedge.exe 86 PID 680 wrote to memory of 5088 680 msedge.exe 86 PID 680 wrote to memory of 5088 680 msedge.exe 86 PID 680 wrote to memory of 5088 680 msedge.exe 86 PID 680 wrote to memory of 5088 680 msedge.exe 86 PID 680 wrote to memory of 5088 680 msedge.exe 86 PID 680 wrote to memory of 5088 680 msedge.exe 86 PID 680 wrote to memory of 5088 680 msedge.exe 86 PID 680 wrote to memory of 5088 680 msedge.exe 86 PID 680 wrote to memory of 5088 680 msedge.exe 86 PID 680 wrote to memory of 5088 680 msedge.exe 86 PID 680 wrote to memory of 5088 680 msedge.exe 86 PID 680 wrote to memory of 5088 680 msedge.exe 86 PID 680 wrote to memory of 5088 680 msedge.exe 86 PID 680 wrote to memory of 5088 680 msedge.exe 86 PID 680 wrote to memory of 5088 680 msedge.exe 86 PID 680 wrote to memory of 5088 680 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1289278308940255302/1289285482609643601/guns.rbxm?ex=66f8442c&is=66f6f2ac&hm=c865e967af7298fed0c71a55201a779fdd2571e4a42cf85927062785920ef673&1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90de746f8,0x7ff90de74708,0x7ff90de747182⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,150533656089477396,4201829282181754666,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,150533656089477396,4201829282181754666,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,150533656089477396,4201829282181754666,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,150533656089477396,4201829282181754666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,150533656089477396,4201829282181754666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,150533656089477396,4201829282181754666,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 /prefetch:82⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,150533656089477396,4201829282181754666,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,150533656089477396,4201829282181754666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,150533656089477396,4201829282181754666,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,150533656089477396,4201829282181754666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,150533656089477396,4201829282181754666,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4588 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,150533656089477396,4201829282181754666,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,150533656089477396,4201829282181754666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2092,150533656089477396,4201829282181754666,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1156
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaulte991d448h1551h40c1h91e9h4dec3040a40f1⤵PID:5260
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff90de746f8,0x7ff90de74708,0x7ff90de747182⤵PID:5340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,12552512996658907253,16626997320252746596,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:5592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,12552512996658907253,16626997320252746596,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5800
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:6104
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD51cbcf7c7b0d8c9370aaddd99f9ba99d0
SHA123650a4586618171f471735ab3151e6b9fc974d8
SHA256acc4385d39e1887b717ef6d94157aa8344991805eeab889934f669f48b56cdd3
SHA512108530f52989d25298979790b9af19d4d2b17a585e3d891a31823d393d2182b8d3179cc4866239135a66bd2f86ffe20c3af902dbc0401de3867421b8a3c9e0c6
-
Filesize
6KB
MD56b5f2577a801c76a11778bdd93d9a848
SHA156c7365cedc6cfa43039f537bbd14dc37a6c45c0
SHA256b8cd44403c612093048eb1491b5191cf74c14db6fae27a44277f754bd4b67964
SHA5125f95c45c838377f9e1a4b72cd1e37d78fae121b14c6bf28a0b69d88e587dc78eed4e62a0e7c617e5d60f608cbcf084ca4a1dcce538ac07acef9f01542887e38f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5188d622dfacebd7ac96d3650bca50ce0
SHA14b7f61659bc0410438472720ca40f6667b42c5c7
SHA25696ede53f9d20a7fed4e82ebfe50b0d037d41ff5d0bb5289e09ffdf2f2b7aed53
SHA5120cdb20979f54c5159ee571965088967dc1372529de13b040d2b1c508cbca97bced8f37e485d0f3e37f108a8879e88e4c7f3ebdf53dc42a493beb3ce1e874570b
-
Filesize
10KB
MD58e9efdc28b89a71ac28ffc29e336f7f3
SHA10550fcd531519ea4a72ef7110661f2f626dc7984
SHA25682e9da9fa2ffde1129e2f17fd5e68618bfc356cb46d3b180ce40b42ce7496656
SHA51267854abe351744325f5873f9434508757aef347ed4aba1ad140b9b1aaf74345a46805b7110cefa41b1ca0471a19e9a51e48d6578c5919af0e76ad49a7e462ef5
-
Filesize
689KB
MD58a5b942c84a0620f4c2447c1fc232ba7
SHA133a59f135eb1a38b36688a2cf7f69ac119c68c2e
SHA2569ab5d19b8b8c39d48084e8080ed86bb9f51692cc7a5cb1e4694906f780057d07
SHA5124d89e6aa7b3c5268ebbaa1fe1e9f16816111f25c803178a285fd62bc0fd65aa7a2498dffbaf71c0a31f58e6e91d60ec6f86e791d5b1e4d88550e62f8b70defec