Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 03:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://storage.googleapis.com/zeg15s4dg3z4erg3ze1zebzr/dfherhezrbzez.html#FAsU.aspx?ggBvc4ccPL3DczjgFcdcWkckcHXpJckzFcbbb5j
Resource
win10v2004-20240802-en
General
-
Target
https://storage.googleapis.com/zeg15s4dg3z4erg3ze1zebzr/dfherhezrbzez.html#FAsU.aspx?ggBvc4ccPL3DczjgFcdcWkckcHXpJckzFcbbb5j
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 4520 msedge.exe 4520 msedge.exe 4704 identity_helper.exe 4704 identity_helper.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4520 wrote to memory of 864 4520 msedge.exe 83 PID 4520 wrote to memory of 864 4520 msedge.exe 83 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 1880 4520 msedge.exe 84 PID 4520 wrote to memory of 3736 4520 msedge.exe 85 PID 4520 wrote to memory of 3736 4520 msedge.exe 85 PID 4520 wrote to memory of 4720 4520 msedge.exe 86 PID 4520 wrote to memory of 4720 4520 msedge.exe 86 PID 4520 wrote to memory of 4720 4520 msedge.exe 86 PID 4520 wrote to memory of 4720 4520 msedge.exe 86 PID 4520 wrote to memory of 4720 4520 msedge.exe 86 PID 4520 wrote to memory of 4720 4520 msedge.exe 86 PID 4520 wrote to memory of 4720 4520 msedge.exe 86 PID 4520 wrote to memory of 4720 4520 msedge.exe 86 PID 4520 wrote to memory of 4720 4520 msedge.exe 86 PID 4520 wrote to memory of 4720 4520 msedge.exe 86 PID 4520 wrote to memory of 4720 4520 msedge.exe 86 PID 4520 wrote to memory of 4720 4520 msedge.exe 86 PID 4520 wrote to memory of 4720 4520 msedge.exe 86 PID 4520 wrote to memory of 4720 4520 msedge.exe 86 PID 4520 wrote to memory of 4720 4520 msedge.exe 86 PID 4520 wrote to memory of 4720 4520 msedge.exe 86 PID 4520 wrote to memory of 4720 4520 msedge.exe 86 PID 4520 wrote to memory of 4720 4520 msedge.exe 86 PID 4520 wrote to memory of 4720 4520 msedge.exe 86 PID 4520 wrote to memory of 4720 4520 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://storage.googleapis.com/zeg15s4dg3z4erg3ze1zebzr/dfherhezrbzez.html#FAsU.aspx?ggBvc4ccPL3DczjgFcdcWkckcHXpJckzFcbbb5j1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdce3446f8,0x7ffdce344708,0x7ffdce3447182⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2260,14663634038889502834,15152906143079660335,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:22⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2260,14663634038889502834,15152906143079660335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2260,14663634038889502834,15152906143079660335,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,14663634038889502834,15152906143079660335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,14663634038889502834,15152906143079660335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,14663634038889502834,15152906143079660335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,14663634038889502834,15152906143079660335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,14663634038889502834,15152906143079660335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2260,14663634038889502834,15152906143079660335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2260,14663634038889502834,15152906143079660335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,14663634038889502834,15152906143079660335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,14663634038889502834,15152906143079660335,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,14663634038889502834,15152906143079660335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,14663634038889502834,15152906143079660335,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2260,14663634038889502834,15152906143079660335,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3164
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
20KB
MD56931123c52bee278b00ee54ae99f0ead
SHA16907e9544cd8b24f602d0a623cfe32fe9426f81f
SHA256c54a6c3031bf3472077c716fa942bd683119dc483b7e0181e8a608fa0b309935
SHA51240221fe98816aa369c45f87dc62e6d91fcdb559d9756cb6a05819f1cde629e23a51803e71371f4e4f27112a09489d58ed45b2b901a5f2f00c69c082b3576057f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD5f1f07efdf0c6413f646ff19995b57019
SHA13ef019a237e795c066d200795c0e7ee2ade28ec2
SHA2568da181cf3992d6b7a5aa6f479f5a10cc15b834c8b3f30c5ab4ccae0fc2f1dc5a
SHA512afbc5675fc39a167eeafd93b6837b22aa3e93030505ce207ccb42b97b3b5352ad0a3081afbb6d1f549c4c4afef9286b3f8f1d10d4d40b52e8bc9bb80d3e82ab9
-
Filesize
3KB
MD51cac2ebd654724d0e5155d37330df5d1
SHA1738f68043491fd23c2b23d88a3b30524d19abbf1
SHA256d441a801dab97687accdda8e0556a49eaa753499d70bd32a8310905fd2430119
SHA5126c74c7d5bdc3841483ff08a3ec12944fde1885deb71f1e97633d0500100e8d40120fe993bfaa36989393d9be62598422bdbc8521256a0e176d598ad43d69598f
-
Filesize
3KB
MD5b96a592dc38a4f732dd3898e63301a8d
SHA134163464d3222fccd5cb3925ff429e1772ca2aae
SHA25657ef7a71351d3222d85f51c644fbf303f92e6e4a9eae88f3413db094b43cff16
SHA5121971942720007de6dcd70907876d2be5578c905c5b3dc2b0baaaa9542c0832dc877620a60f256997a3ceeb8553c20401bfcdf8fa5d749a39478e2f3c2d2a2254
-
Filesize
6KB
MD557f32ce10b47c2da752b492f0591b89e
SHA1d0dbaccc66184b9e46251e36b170b9a7cd856607
SHA2568ce51cca2409c40fb6d4633b3cbf5d58c53964dd5caa268b5d41fb749e27169e
SHA512eeca1203e584e6f7ebfc13138dc86543da2cf5fa938947b61ddbc286a4ec8397b833814527d128566eef311f4297461beaab159ea2a6d7a294ca3afdbf8eb9d4
-
Filesize
7KB
MD52951d2ef7d94cf4fb37c663681d28303
SHA1f208b1626edf3b440f7620bdcf4f9bfeb4954e0a
SHA256f94e191b90a1affc9637d80cc4983b2071e89195873d43e730e4bf2e429f87c8
SHA51287c03828ac1f48a5db7c90f570018664bdc37a5c84eff0adc0eddd0f1a6f8cf246861514d9d2f7c3656ed023172ea72377ace751ece12a02304dacc644b9a6aa
-
Filesize
1KB
MD5eda8a9b0000b42d3b25b69ffc2a9ab38
SHA14567fb90a7c110822233fb80ba1a5c95b8ceb607
SHA256761fecf5763bec28ee53a53552ca120be9ea1b44d37c567f3709cb805f6fb513
SHA51212b03478d5bac46016e6c5feda1d275e5ad6bbf8f927fc2f006146ac6a9c1df500ca09fcb4581298081604dcfeb1d3f4644238a7177b70e7f9510b28179b4bb2
-
Filesize
1KB
MD56320e75120b3639f01afb9db2ca70098
SHA19378493773e737d9a37951733d07e97cc69d21c8
SHA256b22a5095c7cdca96bd983110904c9c3cbbf055349b75cdf2fb7a322e88547d95
SHA5125a608043c4903cfc41e0a4e53c77dde6f060cbf7bfe80bcb950606801eab18bb521ed20158527b608e70c249d0932a45870320c6b07eb47b4ca6a2250882f7c8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58b81504c8f57d3edd07010c8cc4ec6d1
SHA112261424d15c950a92afc0cd2a21d36c943ce328
SHA256c8ff670a94dee8487443db9adab68168f9062f4a3f9561abd5bd6a9a2f7644a9
SHA512c3bed7fca0d6e9a1d50052fd8a851658d89d15159a491ac33ae02362fd5efb20f802bfe101047125391faa110447eb601b74cc5ba53a2abec7b8e13800a02135