Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 19:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://steamcomnunnitly.com/get/activation/feoeer82794hFvrbgea3
Resource
win10v2004-20240426-en
General
-
Target
https://steamcomnunnitly.com/get/activation/feoeer82794hFvrbgea3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 3212 msedge.exe 3212 msedge.exe 1452 msedge.exe 1452 msedge.exe 4796 identity_helper.exe 4796 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
msedge.exepid process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1452 wrote to memory of 1464 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1464 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 4412 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 3212 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 3212 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe PID 1452 wrote to memory of 1304 1452 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://steamcomnunnitly.com/get/activation/feoeer82794hFvrbgea31⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ffa7c1346f8,0x7ffa7c134708,0x7ffa7c1347182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,34201090038862323,17444704514096162624,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,34201090038862323,17444704514096162624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,34201090038862323,17444704514096162624,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,34201090038862323,17444704514096162624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,34201090038862323,17444704514096162624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,34201090038862323,17444704514096162624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,34201090038862323,17444704514096162624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,34201090038862323,17444704514096162624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,34201090038862323,17444704514096162624,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,34201090038862323,17444704514096162624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,34201090038862323,17444704514096162624,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,34201090038862323,17444704514096162624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000024Filesize
121KB
MD52d64caa5ecbf5e42cbb766ca4d85e90e
SHA1147420abceb4a7fd7e486dddcfe68cda7ebb3a18
SHA256045b433f94502cfa873a39e72d616c73ec1b4c567b7ee0f847f442651683791f
SHA512c96556ec57dac504919e806c7df536c4f86892b8525739289b2f2dbbf475de883a4824069dbdd4bb1770dd484f321563a00892e6c79d48818a4b95406bf1af96
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000025Filesize
119KB
MD557613e143ff3dae10f282e84a066de28
SHA188756cc8c6db645b5f20aa17b14feefb4411c25f
SHA25619b8db163bcc51732457efa40911b4a422f297ff3cd566467d87eab93cef0c14
SHA51294f045e71b9276944609ca69fc4b8704e4447f9b0fc2b80789cc012235895c50ef9ecb781a3ed901a0c989bed26caa37d4d4a9baffcce2cb19606dbb16a17176
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD549adb470f409b6ffbe4fdcc36d4ed2ac
SHA1282cc52ae083090880d119c8055abe29126d750a
SHA2562fa017558a57e122b7c230b0d983664eb7538f209767fc86c8173986bf64d690
SHA5122b71523912c79e27368f73eb96ff43ad58a8e20fa20f6c953f651d542bdaa014122c7828a042017e6dc0f2003c93208fb3f4a679d8c5d6e6eff7ea0003073158
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
921B
MD52111d39ef383a3748e6af40b72c2f4dc
SHA187f7f95fe4214eef4cab444f12a19dc40b9461ba
SHA2560d2c3be20d475943e1b89cec3b6e50b6e1479959128d13405c1dafa404c67816
SHA51218f3407898c3c5c662c5d32f2e2e160220a649c3ceb503e17c5af0df72961b02def543c6547e227dcc126d739b3e696760eec6c825f9ec768d6ff0603bf084f8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD5e226bb68de8b9fd7d7e19d2021186dbf
SHA1a5b800b2263c276a792a6b67e69013a453f444bd
SHA2568f7fc01808440756afd7ba76d26ba0daebbf48a3adc057d674418cc22f79805b
SHA5120d1f982b493b58c1a2a1b8e8be5be8bdb32e2f39ce58f21fa8776be4f3b1bb9d6b1a1be8c4052a2e1a596abacbc6ee2a09bae1f98f434a7e94cedef3ada49598
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD57703b44e90cf64e707d136a674a39c84
SHA158e901b3229baab944d8dc34807b6c6668f7c552
SHA256d18745282a03255faf58abbf9ca4c74e44a733f5d3491d6da5befb4ebe3b96e2
SHA51281f945d7a9c0130084afdc4f673b5f92ff8fd124bfa81c6acc36c90094858fc3bb0d3282290c23e87aab9a4c36b1c767c7eede19b80fd611910c8fdb8d079bcf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5441e371f9c5e3c41e72361893b41b215
SHA1a0bdd8c07b17ce54b8266621464d1a37a40032d3
SHA256ca8fe06b9c39b3600895fc8040def7b54f8f6db7bfad24bf20be010e466c4483
SHA5122c2c2107065222a947517ac25e3125dfc063df2e04e7e01c533dcd1b6ed74e2b4b01f1719d56f29d74d838279d3042653abf6675c82c5c58023626e615e73bf8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5a48aaf4094f290a9482987b1dd7ae726
SHA1209defc29b15295f3d4543f81a59e6d800ef1441
SHA256907a317f1278db69b43204a1e230b79fac42197e70fecd5a8430cbfc32a48b69
SHA512bb3094714028c890a7cbb6b5ff8ce74217bf9d4fd7604166f580bc3bb4884d2052ebe22c379c97d682414371fbbb41d2032c338999f305ac0429d3d462f55a1d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5349abda895745184e5ef1985855be091
SHA1f0d89a4d6dc36c0adb64604c08486b1b5d56e1d4
SHA2566398fcfa132d122d0190aacbb1115cac18816b0878a3d667fc9f923b242ff43b
SHA51269e3fda712f141c09209a5314a648391987edaf7b316219e1602fcfd42531e28068fad46ffd7ecaacf9742ba6b182485dd1b4c83609ef776a6aa0510fc06a649
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
10KB
MD55f2a6d7eff9ea55aaea2507e74b9b0ec
SHA19846520e814c672b1cc6c36632f86c1abb5f8b2d
SHA2569931184004c54302ec74f39ff8eba1b035a91f538e5ce17d8b7f43216f2869dd
SHA512295fc398a1168a48c553d426081acdd86d9196b2abdc1741f98cdeceae275529231fd87621384c5968a992fe33fe5b12d6513b0eaf11a995c21a590bf1cf6bb7
-
\??\pipe\LOCAL\crashpad_1452_YZZZAPIGYIHEABTEMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e