Resubmissions
22/11/2023, 08:49
231122-krdzxabc96 122/11/2023, 08:46
231122-kpkpnsbc93 122/11/2023, 08:43
231122-kmwn6abh8x 4Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2023, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
file.js
Resource
win10v2004-20231020-en
General
-
Target
file.js
-
Size
1KB
-
MD5
ca7d28891a0a41877e40c0c0cc32156a
-
SHA1
28f0f00bf6e41b17b93246b599709e704677dd10
-
SHA256
c2761b204d911ca574ddb151b1bce0dfeebdb0ef4b8d5ba300595611006266b0
-
SHA512
ce69134fe248e6ce8d77eeb24b54fd6c9c89b704bbf18f762477ee1159f1d0db6b842be314b70b96ffd5f95e77c57df39b790261a267b04c74e5a4eefc98f36b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1116 Notepad.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2416 msedge.exe 2416 msedge.exe 4480 msedge.exe 4480 msedge.exe 1800 identity_helper.exe 1800 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4480 wrote to memory of 4936 4480 msedge.exe 100 PID 4480 wrote to memory of 4936 4480 msedge.exe 100 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 3048 4480 msedge.exe 101 PID 4480 wrote to memory of 2416 4480 msedge.exe 102 PID 4480 wrote to memory of 2416 4480 msedge.exe 102 PID 4480 wrote to memory of 5112 4480 msedge.exe 103 PID 4480 wrote to memory of 5112 4480 msedge.exe 103 PID 4480 wrote to memory of 5112 4480 msedge.exe 103 PID 4480 wrote to memory of 5112 4480 msedge.exe 103 PID 4480 wrote to memory of 5112 4480 msedge.exe 103 PID 4480 wrote to memory of 5112 4480 msedge.exe 103 PID 4480 wrote to memory of 5112 4480 msedge.exe 103 PID 4480 wrote to memory of 5112 4480 msedge.exe 103 PID 4480 wrote to memory of 5112 4480 msedge.exe 103 PID 4480 wrote to memory of 5112 4480 msedge.exe 103 PID 4480 wrote to memory of 5112 4480 msedge.exe 103 PID 4480 wrote to memory of 5112 4480 msedge.exe 103 PID 4480 wrote to memory of 5112 4480 msedge.exe 103 PID 4480 wrote to memory of 5112 4480 msedge.exe 103 PID 4480 wrote to memory of 5112 4480 msedge.exe 103 PID 4480 wrote to memory of 5112 4480 msedge.exe 103 PID 4480 wrote to memory of 5112 4480 msedge.exe 103 PID 4480 wrote to memory of 5112 4480 msedge.exe 103 PID 4480 wrote to memory of 5112 4480 msedge.exe 103 PID 4480 wrote to memory of 5112 4480 msedge.exe 103
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\file.js1⤵PID:4052
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2236
-
C:\Windows\System32\Notepad.exe"C:\Windows\System32\Notepad.exe" C:\Users\Admin\AppData\Local\Temp\file.js1⤵
- Opens file in notepad (likely ransom note)
PID:1116
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff845fd46f8,0x7ff845fd4708,0x7ff845fd47182⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,10500425976284605397,13342539767897862982,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,10500425976284605397,13342539767897862982,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,10500425976284605397,13342539767897862982,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10500425976284605397,13342539767897862982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10500425976284605397,13342539767897862982,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10500425976284605397,13342539767897862982,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10500425976284605397,13342539767897862982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,10500425976284605397,13342539767897862982,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3996 /prefetch:82⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,10500425976284605397,13342539767897862982,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3996 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10500425976284605397,13342539767897862982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10500425976284605397,13342539767897862982,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10500425976284605397,13342539767897862982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10500425976284605397,13342539767897862982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10500425976284605397,13342539767897862982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10500425976284605397,13342539767897862982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3820 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10500425976284605397,13342539767897862982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1752 /prefetch:12⤵PID:1304
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1792
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50629525c94f6548880f5f3a67846755e
SHA140ef667fc04bb1c0ae4bf2c17ded88594f0f4423
SHA256812576f4a24f399abbd54b83ba7f404f021d4a7d2ec0fd2f988ebf4cbf8477ee
SHA512f74d2e4a65a152f46852eb78dd70a958fdfb8c14e060ca41ffa783b7362e44659cc5fc73f59f3edb1f1d817000b85de7c1860512aa65d937eb5a0a8d9e5890fa
-
Filesize
260B
MD576f5a4ca21b287ad6a7943354f4f0690
SHA1f3f4c0ac6a6d11127302786ff6261d622248ec67
SHA256155ff97f0b9beeaea03ec668c6b781038c8479b01e4bedbe5e4e676346a5fa97
SHA512a5e494b11153821367fcf7dc10a1bb1c2b775fd0e41f4472c0beae6d3ed9bdbfb86dac69deb7a6556de88e9e36cf61515ea13622749c05ca99a3cd1f541968f7
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5ae646be08ef85a228642957899ea12ba
SHA131e3f8398ed5d6cbaedd68816fbe89ac9b558cbe
SHA256b8fa123a8c0e4aee340b8b07713213c215b3c10db0a4d813e302e6939a749c5c
SHA512d7e2c9d2db0f8c63dc81d9a1141486d128e6d3e376cee02d7b3d17ca9c051c6e3aac39acc0d7a2ac93d2c85c25e47693f4500fac6d0cc8be72def54fd7362c88
-
Filesize
7KB
MD5c377b3d95e82cdadf8a4a60cdfcb94cf
SHA1c83c96352910c7276e96efa4caf965e0882a5afd
SHA256a98a4902e3153d061df2cab05d49d189a2c2eed67f4659080a2fcb43fc151169
SHA5122298ba35da69eafbd2e94ddfdfac80a103d94a8cbd54afa61323c3756265848a85b9f84d411967379d6b0a56448db9a33302d86bb4cd77e4b5f818f049fc0577
-
Filesize
7KB
MD52b5dd7f08847ec9e11605d90ed7ea2d8
SHA179f9258e49a3bc590db0e6d999c90ee91bd4a18a
SHA256915c9bc9e47c8f7e4e2610ecb8c3d79931ec190e40b5ada337a5963d1cd769fd
SHA5122d1ebb2eda965e4dd04d82f5b766b3c9be9225db8811ebe63d209251b11648c5207e7cc042a117a73922fbb9e02b0f599a5d5404cbe6246acc31a55d02406865
-
Filesize
5KB
MD50fcdab079e7d596d09a2d5803cdad4c0
SHA1d0e9fdd7fa47bcaaf6fff5565bc3dd59e4efb818
SHA256e552b58a96ac9514714fc9b8596f155bd0b395cd597b09c08d91cab33f84c8a7
SHA5122ba0e724e082f4286bfac8ed116856774c828d1a144f7fab13f3457511a09a0c91ab920d0abd86bad5b5a40ee3f049c271cedbb4f82094c8f3d229b078d11fe6
-
Filesize
7KB
MD5d7160363d7e4c8d4fceb3ff91467f16f
SHA16c0813b58752e9cf6e4475ebf9bf45817e9ac8f6
SHA2563ce64fd72da786d35eb2a89df2fa06b78399d58c23ba5807f1b8b1c63e6b8515
SHA5128855768b542fcb384a9140ff23fa4135c7ad38a17bd0e2cc4474f9e3d9ffe388876403b3a4a3f7e2cba19e2b0aa77a59e25fa483fb955f62bba1660772bc67b0
-
Filesize
24KB
MD5fd20981c7184673929dfcab50885629b
SHA114c2437aad662b119689008273844bac535f946c
SHA25628b7a1e7b492fff3e5268a6cd480721f211ceb6f2f999f3698b3b8cbd304bb22
SHA512b99520bbca4d2b39f8bedb59944ad97714a3c9b8a87393719f1cbc40ed63c5834979f49346d31072c4d354c612ab4db9bf7f16e7c15d6802c9ea507d8c46af75
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50bed09cdb09772fabb61c665b3d66385
SHA16056506fd11bfa54521e1594e523089bcbb72459
SHA2569103c245d8a9c264e4560d528ec0d95a8fa8e34d1bd84ef343a89a507343604e
SHA512d6d8b637e91fdc1b9872b973b014bba869f9f7bdea8abb3fe8f0a7d48ebc07e74d316069d7004c902748d14cc7f350b232007158948937b25139061361c6e3ff