Overview
overview
3Static
static
1synllc.git...ace.js
windows7-x64
3synllc.git...ace.js
windows10-2004-x64
3synllc.git...ook.js
windows7-x64
3synllc.git...ook.js
windows10-2004-x64
3synllc.git...min.js
windows7-x64
3synllc.git...min.js
windows10-2004-x64
3synllc.git...n.html
windows7-x64
3synllc.git...n.html
windows10-2004-x64
3synllc.git...g.html
windows7-x64
3synllc.git...g.html
windows10-2004-x64
3synllc.git...t.html
windows7-x64
3synllc.git...t.html
windows10-2004-x64
3synllc.git...y.html
windows7-x64
3synllc.git...y.html
windows10-2004-x64
3synllc.git...tor.js
windows7-x64
3synllc.git...tor.js
windows10-2004-x64
3synllc.git...min.js
windows7-x64
3synllc.git...min.js
windows10-2004-x64
3synllc.git...ght.js
windows7-x64
3synllc.git...ght.js
windows10-2004-x64
3synllc.git...x.html
windows7-x64
3synllc.git...x.html
windows10-2004-x64
3synllc.git...n.html
windows7-x64
3synllc.git...n.html
windows10-2004-x64
3synllc.git...n.html
windows7-x64
3synllc.git...n.html
windows10-2004-x64
3synllc.git...min.js
windows7-x64
3synllc.git...min.js
windows10-2004-x64
3synllc.git...ust.js
windows7-x64
3synllc.git...ust.js
windows10-2004-x64
3synllc.git...t.html
windows7-x64
3synllc.git...t.html
windows10-2004-x64
3Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2024, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
synllc.github.io/synapse-x-documentation/ace.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
synllc.github.io/synapse-x-documentation/ace.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
synllc.github.io/synapse-x-documentation/book.js
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
synllc.github.io/synapse-x-documentation/book.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
synllc.github.io/synapse-x-documentation/clipboard.min.js
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
synllc.github.io/synapse-x-documentation/clipboard.min.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
synllc.github.io/synapse-x-documentation/development/dev_introduction.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
synllc.github.io/synapse-x-documentation/development/dev_introduction.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
synllc.github.io/synapse-x-documentation/development/supervisor_programming.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
synllc.github.io/synapse-x-documentation/development/supervisor_programming.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
synllc.github.io/synapse-x-documentation/development/syn_environment.html
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
synllc.github.io/synapse-x-documentation/development/syn_environment.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
synllc.github.io/synapse-x-documentation/development/syn_security.html
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
synllc.github.io/synapse-x-documentation/development/syn_security.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
synllc.github.io/synapse-x-documentation/editor.js
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
synllc.github.io/synapse-x-documentation/editor.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
synllc.github.io/synapse-x-documentation/elasticlunr.min.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
synllc.github.io/synapse-x-documentation/elasticlunr.min.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
synllc.github.io/synapse-x-documentation/highlight.js
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
synllc.github.io/synapse-x-documentation/highlight.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
synllc.github.io/synapse-x-documentation/index.html
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
synllc.github.io/synapse-x-documentation/index.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
synllc.github.io/synapse-x-documentation/install/installation.html
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
synllc.github.io/synapse-x-documentation/install/installation.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
synllc.github.io/synapse-x-documentation/introduction.html
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
synllc.github.io/synapse-x-documentation/introduction.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
synllc.github.io/synapse-x-documentation/mark.min.js
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
synllc.github.io/synapse-x-documentation/mark.min.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
synllc.github.io/synapse-x-documentation/mode-rust.js
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
synllc.github.io/synapse-x-documentation/mode-rust.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
synllc.github.io/synapse-x-documentation/print.html
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
synllc.github.io/synapse-x-documentation/print.html
Resource
win10v2004-20241007-en
General
-
Target
synllc.github.io/synapse-x-documentation/development/syn_security.html
-
Size
27KB
-
MD5
dca129e24d9f1263f748da69a6c869d7
-
SHA1
f22df110833ef6a8d9da1377e9e6c1ca67b389dc
-
SHA256
82bda362efdb06cd8b0ec3f1728cfba576f94c7437980fffc836afdd539240e6
-
SHA512
19b389316eaca1d4fbe02531a88cb3b854dd30640544aa70bfb142a8fb7f0b7e617e88534ab3eea50ff79c6568f57373013d73e6bf6d37c0c8821c98cad82880
-
SSDEEP
384:zJnxfrhuSSDfJsM0Il6Pof/oaADEcvVOjdjkOApO/nf4DaAbFtf0fXUCqZXYjoUU:zJJJRHTfnblp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 732 msedge.exe 732 msedge.exe 1160 identity_helper.exe 1160 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 732 wrote to memory of 4020 732 msedge.exe 83 PID 732 wrote to memory of 4020 732 msedge.exe 83 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 3268 732 msedge.exe 85 PID 732 wrote to memory of 2260 732 msedge.exe 86 PID 732 wrote to memory of 2260 732 msedge.exe 86 PID 732 wrote to memory of 1512 732 msedge.exe 87 PID 732 wrote to memory of 1512 732 msedge.exe 87 PID 732 wrote to memory of 1512 732 msedge.exe 87 PID 732 wrote to memory of 1512 732 msedge.exe 87 PID 732 wrote to memory of 1512 732 msedge.exe 87 PID 732 wrote to memory of 1512 732 msedge.exe 87 PID 732 wrote to memory of 1512 732 msedge.exe 87 PID 732 wrote to memory of 1512 732 msedge.exe 87 PID 732 wrote to memory of 1512 732 msedge.exe 87 PID 732 wrote to memory of 1512 732 msedge.exe 87 PID 732 wrote to memory of 1512 732 msedge.exe 87 PID 732 wrote to memory of 1512 732 msedge.exe 87 PID 732 wrote to memory of 1512 732 msedge.exe 87 PID 732 wrote to memory of 1512 732 msedge.exe 87 PID 732 wrote to memory of 1512 732 msedge.exe 87 PID 732 wrote to memory of 1512 732 msedge.exe 87 PID 732 wrote to memory of 1512 732 msedge.exe 87 PID 732 wrote to memory of 1512 732 msedge.exe 87 PID 732 wrote to memory of 1512 732 msedge.exe 87 PID 732 wrote to memory of 1512 732 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\synllc.github.io\synapse-x-documentation\development\syn_security.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb315846f8,0x7ffb31584708,0x7ffb315847182⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14762971174683874167,10054661929641984640,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,14762971174683874167,10054661929641984640,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,14762971174683874167,10054661929641984640,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14762971174683874167,10054661929641984640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14762971174683874167,10054661929641984640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14762971174683874167,10054661929641984640,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14762971174683874167,10054661929641984640,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14762971174683874167,10054661929641984640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14762971174683874167,10054661929641984640,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14762971174683874167,10054661929641984640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14762971174683874167,10054661929641984640,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:1624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
6KB
MD5edbed9b173ada51ecc1911990d0db6d7
SHA1e7d19aec0131b1d48a47145bdc126e1dd99a37f2
SHA2563d9df323d8b6cd7884029e771d647bb72f7c32027eeebbd998b53e4455e085dd
SHA51266ddbec7ca39aaf17011427fb8db55ac31c86ffc9a83fa118a759884b70e478c7fa10cedd208a1ad1814c02ac8cfabe77abe38af0c5bfa82c7648a3b48a2ba77
-
Filesize
5KB
MD5152b8458fdab22bc1b9c5bb8d187b8a6
SHA1b69e96fa4a09fc46e2374b8b1db63ebf091a743b
SHA256ea0dcc9033f3d7a893e5ed8c0ec4cb42b3f9de5860997c30a652b1cea2632f7a
SHA5127edd212b32725cb8ad530a4f72642a623e5d758e8fb11bb7e8b25773f847a93819f08d3014f5a7074c1d7dd1d266ad79944ac7a48db6051d5f0d9da8a5ccf5c1
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD50b54e3a9b900829fcf0a1565b5fd4f8a
SHA10d78a59a0f7e135d8e411ad2bb53be107f7d39ae
SHA2567b819bcd5f47b9fdf1a22910aaaf3d47f4c6f5dcc9e6618b4078dad9f67d416a
SHA51286cfc76cc66f0e8487d6b497cad308b737b0e4a456d6a21227a133192a0b160decfaa5ee242afbf19ef3a518e8d97cfbc13dd5b86bd12c42ca1cc483d14fa6bc