Analysis
-
max time kernel
241s -
max time network
256s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 13:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://scite.ai/authors/sebastian-j-pitman-WGgjzg
Resource
win10v2004-20241007-en
General
-
Target
https://scite.ai/authors/sebastian-j-pitman-WGgjzg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1744 msedge.exe 1744 msedge.exe 4564 msedge.exe 4564 msedge.exe 5020 identity_helper.exe 5020 identity_helper.exe 5440 msedge.exe 5440 msedge.exe 5440 msedge.exe 5440 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4564 wrote to memory of 1360 4564 msedge.exe 83 PID 4564 wrote to memory of 1360 4564 msedge.exe 83 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1932 4564 msedge.exe 84 PID 4564 wrote to memory of 1744 4564 msedge.exe 85 PID 4564 wrote to memory of 1744 4564 msedge.exe 85 PID 4564 wrote to memory of 4456 4564 msedge.exe 86 PID 4564 wrote to memory of 4456 4564 msedge.exe 86 PID 4564 wrote to memory of 4456 4564 msedge.exe 86 PID 4564 wrote to memory of 4456 4564 msedge.exe 86 PID 4564 wrote to memory of 4456 4564 msedge.exe 86 PID 4564 wrote to memory of 4456 4564 msedge.exe 86 PID 4564 wrote to memory of 4456 4564 msedge.exe 86 PID 4564 wrote to memory of 4456 4564 msedge.exe 86 PID 4564 wrote to memory of 4456 4564 msedge.exe 86 PID 4564 wrote to memory of 4456 4564 msedge.exe 86 PID 4564 wrote to memory of 4456 4564 msedge.exe 86 PID 4564 wrote to memory of 4456 4564 msedge.exe 86 PID 4564 wrote to memory of 4456 4564 msedge.exe 86 PID 4564 wrote to memory of 4456 4564 msedge.exe 86 PID 4564 wrote to memory of 4456 4564 msedge.exe 86 PID 4564 wrote to memory of 4456 4564 msedge.exe 86 PID 4564 wrote to memory of 4456 4564 msedge.exe 86 PID 4564 wrote to memory of 4456 4564 msedge.exe 86 PID 4564 wrote to memory of 4456 4564 msedge.exe 86 PID 4564 wrote to memory of 4456 4564 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://scite.ai/authors/sebastian-j-pitman-WGgjzg1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb6b9246f8,0x7ffb6b924708,0x7ffb6b9247182⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,2259472557069728162,4149110289064693239,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,2259472557069728162,4149110289064693239,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,2259472557069728162,4149110289064693239,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2259472557069728162,4149110289064693239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2259472557069728162,4149110289064693239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2259472557069728162,4149110289064693239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2540 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2259472557069728162,4149110289064693239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,2259472557069728162,4149110289064693239,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6136 /prefetch:82⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,2259472557069728162,4149110289064693239,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2259472557069728162,4149110289064693239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2259472557069728162,4149110289064693239,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2259472557069728162,4149110289064693239,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,2259472557069728162,4149110289064693239,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,2259472557069728162,4149110289064693239,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5440
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
215KB
MD5e579aca9a74ae76669750d8879e16bf3
SHA10b8f462b46ec2b2dbaa728bea79d611411bae752
SHA2566e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf
SHA512df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize984B
MD5d33f575e53259ae2722579721b77f325
SHA1ca009b06639d603bb9ac050c52fba3bcbb53c02c
SHA256f1d23d793035e83ea93f8d0fee1804ef461094ea5df5746e2e3c7f61b6c5b7d3
SHA512ba8ccd5c173154dfca6eef75c6de339710cfb7770e36f911148fd2a92923004f8efe21d2b2c4b0a100a0c799f6fc97ba66f17230ef4d52695d99a180345b4542
-
Filesize
2KB
MD54290e017a7862aeac0e3fa4196d8cdae
SHA13415b28bec48f6c391b32c5911cd2a4bbbd92e0f
SHA25618a28fe154f012dd03ee0f05afefdceb1efcbb9337775cd35f1613e0c6f1133a
SHA51256da34525a4ac93e4e076c3b154e039d26f9ede3a60e3e255021d7685a54a130f3660fb442fd51a8ef281756efda603fe96b41b201bb0ff177c7aaad48c97689
-
Filesize
7KB
MD55850511f1af57acb227335803abd36de
SHA1eeefae7b9b9b9d18c0a36edb303ae63da802349c
SHA2566d7de85f66d3eae28b0dbcde00c305c58ad07562dd9147a10c9bcc0189d8670b
SHA51239f077c5a4fe5b9bf1023ba9fe53c8d60be566917c067ef68da8e8abb00a63fbc7133299ea3a01125a37cc7262df5f783994e11808310169c5a19ef957201059
-
Filesize
5KB
MD58ea19fe04d8ff58238a714c45da1c87f
SHA1fcb9503d32a594c623d2ab651ca9ac3a026b1259
SHA2563f44cd8b2739da697ae72885c29d7b500eb3c57a9b861cd9f0083c04d8827023
SHA51257f2a2f400726ff91131ee82decd6c4a486241f87f9a7bd393e7c95fded5b5762a258efb9b1e58643d93e761d491f33c9f9527637fb8cef818b0ff2b3f82cda1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\acf108319f3c76a12710615e84edef6ed38a9fa4\index.txt
Filesize76B
MD5484c273e86f94ec1aba19afcbd4092ff
SHA19decbc9f249cb2fefb1e9b16fa1c6692c661e7f8
SHA256fdf56b6e8701b0a1278c87f0ec9d3863e33c3caecc91dd4548392b00dd9b383f
SHA51288eb5f8aedf29999d3154545b887978aabf602e2aac8b3a731ae7415686924264db757016448b558c91b05fa5475fa7e9f932bc374f565a39f025d50d72ee5a7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\acf108319f3c76a12710615e84edef6ed38a9fa4\index.txt
Filesize83B
MD55fc2d0af70be2c20235cc4f1f7d16c21
SHA1f7bc7a46e3082d380963795e909acb76c9e6eb07
SHA256f8dab99149c20472da618d21d320ba675a7f779bcbd3f0d8a18cde0587b2b597
SHA51290284616eed407b5e7fafc7939f8faaa7cef9fd1641b7c194434c4f73a4890c963056b76d53ca603e852ce599138b1733bafd17fbf92118c1b58ba0838f8ac36
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5e77a738bdb216c6ebe1938c430e74231
SHA19939541616132047c6c30e4632d153234e6dce65
SHA256fa85be34df6f4758250dcfb2eec993c9882144438bc9624455a625bed79b67d0
SHA512a322fd5185939a3cba8a9427542ecefa5a4b6467c947b77f661baa383964fbd7ba28c5bbf4cb582ada76ff4e38b72e055321a2ca2ec8e622798571441418c9b7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57e8ba.TMP
Filesize48B
MD5f69f225130246866307b231476fdaa5b
SHA1888621ac319b7a64cca325e57cdad3eba8672b4e
SHA256b162fa5ae2f8f8307b295a38c41be5d136af77996786f10ea01a390990461bc5
SHA5129b4653e4b08c64a83d131b62219a0e1501daeb32362c5feaa6c197c36454e49b206aac5ffbd162d063d2f2ac92ee22864ea7882b67f6feef972c9184a95fba62
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f3a74e99afe420e0cb4540798d016d2a
SHA191e388bdb2ce00d40032d13a7a6d3e3aaf77f836
SHA256db77c0931e6c7e06ba5aefc85ed46b4081ca6ad61c8f44f200f4ff5689c659cd
SHA512f2a9608a3fe01d6efd52273fdcf70c7646e8f4bb47d1817ff70f6a55d3c0f238e8a6e433a30c942550b6dd355102ddb8624994188f28dc6f6a26fe517f12fc6d