Analysis
-
max time kernel
483s -
max time network
566s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/07/2024, 18:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://discord.com
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
http://discord.com
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
http://discord.com
Resource
win11-20240709-en
General
-
Target
http://discord.com
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 discord.com 9 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2092 msedge.exe 2092 msedge.exe 1504 msedge.exe 1504 msedge.exe 4868 identity_helper.exe 4868 identity_helper.exe 3988 msedge.exe 3988 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 5080 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5080 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 436 1504 msedge.exe 82 PID 1504 wrote to memory of 436 1504 msedge.exe 82 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 4832 1504 msedge.exe 83 PID 1504 wrote to memory of 2092 1504 msedge.exe 84 PID 1504 wrote to memory of 2092 1504 msedge.exe 84 PID 1504 wrote to memory of 2284 1504 msedge.exe 85 PID 1504 wrote to memory of 2284 1504 msedge.exe 85 PID 1504 wrote to memory of 2284 1504 msedge.exe 85 PID 1504 wrote to memory of 2284 1504 msedge.exe 85 PID 1504 wrote to memory of 2284 1504 msedge.exe 85 PID 1504 wrote to memory of 2284 1504 msedge.exe 85 PID 1504 wrote to memory of 2284 1504 msedge.exe 85 PID 1504 wrote to memory of 2284 1504 msedge.exe 85 PID 1504 wrote to memory of 2284 1504 msedge.exe 85 PID 1504 wrote to memory of 2284 1504 msedge.exe 85 PID 1504 wrote to memory of 2284 1504 msedge.exe 85 PID 1504 wrote to memory of 2284 1504 msedge.exe 85 PID 1504 wrote to memory of 2284 1504 msedge.exe 85 PID 1504 wrote to memory of 2284 1504 msedge.exe 85 PID 1504 wrote to memory of 2284 1504 msedge.exe 85 PID 1504 wrote to memory of 2284 1504 msedge.exe 85 PID 1504 wrote to memory of 2284 1504 msedge.exe 85 PID 1504 wrote to memory of 2284 1504 msedge.exe 85 PID 1504 wrote to memory of 2284 1504 msedge.exe 85 PID 1504 wrote to memory of 2284 1504 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://discord.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffc21a3cb8,0x7fffc21a3cc8,0x7fffc21a3cd82⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1816,18330846625322942685,3970142850922285533,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1828 /prefetch:22⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1816,18330846625322942685,3970142850922285533,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1816,18330846625322942685,3970142850922285533,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,18330846625322942685,3970142850922285533,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,18330846625322942685,3970142850922285533,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,18330846625322942685,3970142850922285533,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1816,18330846625322942685,3970142850922285533,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3656 /prefetch:82⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1816,18330846625322942685,3970142850922285533,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5788 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,18330846625322942685,3970142850922285533,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,18330846625322942685,3970142850922285533,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1816,18330846625322942685,3970142850922285533,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,18330846625322942685,3970142850922285533,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,18330846625322942685,3970142850922285533,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1816,18330846625322942685,3970142850922285533,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3880
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1784
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004C8 0x00000000000004CC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b26cef15e9a3cc82fb429a163f96ac6b
SHA1718ac4822198b1a21f43b6941d0d8df107fd0015
SHA25673af2c2ebc9187187d887e4abc8b04561c55f36f7f9cdf20293d522ce5c2f506
SHA51287f96314ea9a1f394d24de5657e61cc6809c961fd05280b4875a06bb928f4e19dadf725fcd0417f16c93cdceca349dd27dd95d0f8f0f756020322803b2f91cdc
-
Filesize
152B
MD55efcc43219d778bd14d32016100f2708
SHA1b06f6726698a68781854bc342a54e06bc4562217
SHA256a7534c7d125854f7fe662a7951443cad1d1ff0d8d3eb537dde5a381cd3415666
SHA5126bbdf16b41bbc3ac5d4e2b93683a712d56eb58719799f69cb7240a77f799928b48af2771f76d9d7829846db12d0116e3a8ea6c5d0f02d5e840db1b3c018480b4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD58d3209fd27abbb9e6b4429698b0b4a1b
SHA1cfec481b327886e9eeccd808fdfc300c99a27c4c
SHA25694ec03f423d2a3e52f3fc1772d7922571bb77c6bfdb89bbeb9d818c53b31a3ce
SHA5125da34021c3166782c9ff85ff544595695bfc1fee31b1f8d233e3939045a44178baac52b6914de4ab85f40f27718a6f78939c6b9c699feb627963ca9c211ea5ea
-
Filesize
1KB
MD58b3e0a769d66cbb2cae966976be264c7
SHA12d81b875fc48728ff83887fd63d2365e9b56d8cc
SHA256d1a0db1d62240e317cc2789ad67cceebdbf0b71ec03a0d3085077a3b2c2a881a
SHA5126fc5775dfb58c7766f862a97902f436f4a12d8e83e1c8522c2e3ba6b6fd845ad1183ba104b1f1f5b73f5d5397adc75c8bee812bf6248f5a8406db4070adcac2d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5255a822f4e785252cec105f77c08dcac
SHA1c437d2eb762f1b22af78a3870493159fc6bffab5
SHA2569c2b7b076fa62c0ba81b735902a7f9077ac4fd5a8e8684baddfeade91ca875d9
SHA5127996a61cfba9137d7d9d2355be04d1c7dcf5657e2f5e8939904a2da1ba90916be5c7a648fda1661d1a111a5498aed9c682374c19c39135b894414c9b99eee8a5
-
Filesize
6KB
MD5a52809103daf97bc4a4a353fccb36ad3
SHA162b1675eef74731dc17da7ff7b0a5a2784fa63b8
SHA256030785c45d53e798e74631e960022414f23bf23c2e2d092a6457dbf0a4d7f77f
SHA5128f475ffdd4717df01c302f5451d0eb23800e0f1c03011eb13dd989871774053082fb179644b74fbaa53421986c5f2f557d561d655086d131497484f04b4034bd
-
Filesize
6KB
MD52f4178b8211ba44b9589cb20c93239bc
SHA177e233e90c9ebec0c35ecf8bcb51999d3dd1eee2
SHA256dbdd5467ab3332b580d0b50842006a2b9ba6bab30cb3c701bb4ee864a89d79af
SHA512ffd2692944aef3f9e0d0c0755237e887e94165002428cc19d49ee2cba09a9fe4eda3f621a6a296d5fa30c4473aadb37c0ee796488d63f94be59db742aad616ff
-
Filesize
872B
MD5287fe85b2322a07159436ef7cf4a034a
SHA12a7178773c8e354e91215e0ff0a0b8ae4f38a7ee
SHA256a3fbbd1481d543bde4ae68be25ea35e3d97f39fd41fe71a2857bdbe2a0182d55
SHA51261281c6d7ee6d901998f3a4a2a7e1dd6b4aee48716417ab8ca3e6da0b7a0ce3b9d82f688cacebdb331f2ea4f0ba5e6ce24635041f1d8a4131d3e52a5fa948722
-
Filesize
704B
MD55842f3b4ff42d2407723fb98851a56cc
SHA15205d1143dfd280eade6f141be2981025b6d3271
SHA2565418db72023294b5990c2749b2adb4f945d2b43a3f98bc183e399d10ae0aa35c
SHA51262138b50714e506a876a9fc4283b538ba1c59cdc3f51c6b55fa7aff28ec66b0443e202ba80b78e843adcccfb6aec1f56779e8ca266de16ffcb414dd0ac458539
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD518a5eec544739859e3758fd2cce19f4a
SHA17db87011250560dbb10f078b9d5730d624a6cb88
SHA25697fbc2bcc5496a4502b138fee5ddcb0bc5f6bac44ad0ad8da70777e6885b5818
SHA512cba564cad5429229be32e9b92ca4a04ca166b9c8447a9ce5eb63592eb9cb674c2c353c78f44d6dab2571e9bff3cc964b1f570863481ae31ac5ac2df0e11d76a0
-
Filesize
11KB
MD5d1ad9518e885fa0c54845cab333e9c40
SHA1acfc362ddbeca345fde15cae5f282aeb1325bc58
SHA2567eb8f77e9cc3cea10611be83443728f669949940fdd395f18c26bccf007b8cf8
SHA512740c755edb2981a3097678b704fd7e1a2d7b5f6280528a61057454c2601b96b65ecb261d18da58627bc52a65d0568b8b7c638558c99336ccb3b47348a51c97cc