Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-08-2024 01:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1pCkW1mcEa3t1JRH_0atYmsTk5Oix_2df/view
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
https://drive.google.com/file/d/1pCkW1mcEa3t1JRH_0atYmsTk5Oix_2df/view
Resource
win11-20240802-en
General
-
Target
https://drive.google.com/file/d/1pCkW1mcEa3t1JRH_0atYmsTk5Oix_2df/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 11 drive.google.com 12 drive.google.com 1 drive.google.com 2 drive.google.com 10 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1972 msedge.exe 1972 msedge.exe 2156 msedge.exe 2156 msedge.exe 2880 msedge.exe 2880 msedge.exe 3960 identity_helper.exe 3960 identity_helper.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1344 2156 msedge.exe 78 PID 2156 wrote to memory of 1344 2156 msedge.exe 78 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 2092 2156 msedge.exe 79 PID 2156 wrote to memory of 1972 2156 msedge.exe 80 PID 2156 wrote to memory of 1972 2156 msedge.exe 80 PID 2156 wrote to memory of 3560 2156 msedge.exe 81 PID 2156 wrote to memory of 3560 2156 msedge.exe 81 PID 2156 wrote to memory of 3560 2156 msedge.exe 81 PID 2156 wrote to memory of 3560 2156 msedge.exe 81 PID 2156 wrote to memory of 3560 2156 msedge.exe 81 PID 2156 wrote to memory of 3560 2156 msedge.exe 81 PID 2156 wrote to memory of 3560 2156 msedge.exe 81 PID 2156 wrote to memory of 3560 2156 msedge.exe 81 PID 2156 wrote to memory of 3560 2156 msedge.exe 81 PID 2156 wrote to memory of 3560 2156 msedge.exe 81 PID 2156 wrote to memory of 3560 2156 msedge.exe 81 PID 2156 wrote to memory of 3560 2156 msedge.exe 81 PID 2156 wrote to memory of 3560 2156 msedge.exe 81 PID 2156 wrote to memory of 3560 2156 msedge.exe 81 PID 2156 wrote to memory of 3560 2156 msedge.exe 81 PID 2156 wrote to memory of 3560 2156 msedge.exe 81 PID 2156 wrote to memory of 3560 2156 msedge.exe 81 PID 2156 wrote to memory of 3560 2156 msedge.exe 81 PID 2156 wrote to memory of 3560 2156 msedge.exe 81 PID 2156 wrote to memory of 3560 2156 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1pCkW1mcEa3t1JRH_0atYmsTk5Oix_2df/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff81ca93cb8,0x7ff81ca93cc8,0x7ff81ca93cd82⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,9392595818665322575,16284018602252818584,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,9392595818665322575,16284018602252818584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,9392595818665322575,16284018602252818584,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9392595818665322575,16284018602252818584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9392595818665322575,16284018602252818584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9392595818665322575,16284018602252818584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1924,9392595818665322575,16284018602252818584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9392595818665322575,16284018602252818584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9392595818665322575,16284018602252818584,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9392595818665322575,16284018602252818584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9392595818665322575,16284018602252818584,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,9392595818665322575,16284018602252818584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,9392595818665322575,16284018602252818584,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4988 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5026e0c65239e15ba609a874aeac2dc33
SHA1a75e1622bc647ab73ab3bb2809872c2730dcf2df
SHA256593f20dfb73d2b81a17bfcc1f246848080dfc96898a1a62c5ddca62105ed1292
SHA5129fb7644c87bdd3430700f42137154069badbf2b7a67e5ac6c364382bca8cba95136d460f49279b346703d4b4fd81087e884822a01a2a38901568a3c3e3387569
-
Filesize
152B
MD5228fefc98d7fb5b4e27c6abab1de7207
SHA1ada493791316e154a906ec2c83c412adf3a7061a
SHA256448d09169319374935a249b1fc76bcf2430b4e1436611f3c2f3331b6eafe55a2
SHA512fa74f1cc5da8db978a7a5b8c9ebff3cd433660db7e91ce03c44a1d543dd667a51659ba79270d3d783d52b9e45d76d0f9467458df1482ded72ea79c873b2a5e56
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD51f2c355052f80d23ca54ec32c380f687
SHA126a297ec20df4172a8133a2ab12a49ac77496636
SHA2568658fc87cc93531cfbcdabea937ab64cbbc08e148e07e39962608fc6995d4eb8
SHA51290f999432dfaae16cdcb16662e361743a76c2b1d84c11b76fd2cf90f31ebd5e6b4603f9d2e7e3853b92f40676539a596d7e7afd64660a8e66d7f92f67eca5180
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
3KB
MD5368a214709e8e1bf70b8cd2398cd5779
SHA129a198a57b6105549f9625c8a364ff0a961d82b7
SHA256d2fe0371c76737ea472b25c780428c61e4780f4574c01dc95b866f55f61be2b3
SHA5127c5800952afe62a437aee7f5fbcf984522b8c60e2f9fe5b7e35f4703a1ce6fc0777b0cd4d453c4a2137cbbaa82affb6938a6b8ed5203211308364b9272df53b0
-
Filesize
3KB
MD562863947226c747c52fb2b90736c2014
SHA1c2393afe4d8f22525633c9a7725ea4bd1557ad3f
SHA256b95c5cb4f3f0d81bf93ad6e9809a43af9a7227f19b03cab9dd44627e195f4f02
SHA5121af86d6dc2e3cca5f846b686573c479740df4396308937bf2be59f2a899c158147cd0634d3c9610007a877e16f0d84e808ada77ed3dd0ce1d9a660052a856db9
-
Filesize
5KB
MD53cedcd49d2be0e43968bd251f36b726e
SHA105e57e3eae6a9da4da842a92163bd099fa6ff1a2
SHA25643a444e06a6bb59bb3b2f41e43b075698b425ec0cfccaaa7fc6e3751397b6641
SHA51297d512a6d2e64594d19c0538b79f42a4f0cf908a3ae7fff6d22baa7d840e1678f555c066f954b135b1e2f792a0f1a52757dff2fc76c16c855a068661f1e17fab
-
Filesize
6KB
MD59558bf82b0f8ccf0285470c5084d4b3b
SHA1c5652b35de152ce7914cfb0c9d72250dde4fcaa7
SHA256fb72efd0d2cdc1468b9b0867dcf46083e0108445684e03c00b530cc9d85cf9c5
SHA512ae0576f9eddfd51f68c1b8e9faa624693828b119f80d2b396de3328759cfbdd9760a9975e8492c30eb9a4474d129585d1997c43ec59d5d21251f93e2fb40c4d3
-
Filesize
6KB
MD545fd17937d93b5d1438c0c90d034d3e6
SHA10d11534f8008bf02d25029676810c930f0f7a533
SHA25691cfc238075fa8b45be6bed238049cecca8bf9cdc1726f0a5d05a115fbf25b1e
SHA512e3589086c3c3eb2998c39f1bc5e0b7796197f6ee7dcddc42cf0ef688bf6e53d2be1cdcfc34fd9e92f00dc52a63df666c8f1b992463415f56519e7c850daf3837
-
Filesize
1KB
MD57d8d4aa7c795409d0819a5a583e3b8d4
SHA16a4e40810d4f52c7dbee4d954c94d92a8278c73e
SHA2561ab6227ba50aa84144a8092815ed1ce35cfd1044aee7f099937f43b7e8cde84a
SHA512ff812c62bef5365c3e565421c479fac0a88cd90a132a9b74ae8cdad20063d68194f33a7a2faaf5c42fa7eeb76f5cc45b5664889fbf9b26ef2e1506cb7f67d5e9
-
Filesize
707B
MD5df465a40c6b3e1e4992a0dc59f3efa75
SHA12554fa042582f63ef179b5932920c16fe805aa2e
SHA256ba4bd2a3593b9233d787987b78af60d4ce47288dcd26648889f9511f7cf77ed7
SHA51263a4cd7eed32de6eed8dcc0386184933791150960124ac24c2cd78bb1fb5d2131275a4008678e9a069e651acf648aca7a76e7b904860cb4ed27c51f92eece96f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD506898a2a35be15a1a4ea8c993db5ef6a
SHA1261e6d6d44aab8673eb476a951d3ec99c06a6ad8
SHA2567cfce7d8ff4727d09b9131c33f9bedccdb960d4b437d2dff096590b58e9621cf
SHA5123ffbd1a97595ead5038f51f66775741961c72b1234a9e75194dbc2842dbb51f417add0dde9a3ddc59ba1a1f47db8533b937b154d1ad69252f58f7b392243b4b0
-
Filesize
11KB
MD502def7c21e53c61bc40f2c436b375789
SHA1833309e6ea160b2e4404b6c1a9751d15a79614f1
SHA2560e735ef79419b63fb056199be075cee0e08d7e847a49d0f4b474767f3a684258
SHA5120d43d4fc01df50ecdba8ad9276e3b69a801d4cb05d15b9dc0c0454dee9f13f44ef6b857e78127f7c2e2f5f14306276e974e8c04bea75ff1e8392f20a7dd530ff