Analysis
-
max time kernel
114s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-08-2024 21:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1hEjGx7gjJ9Sj-CpMnVd62KqcTAtYR3Pp/view
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1hEjGx7gjJ9Sj-CpMnVd62KqcTAtYR3Pp/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 11 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3228 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1336 msedge.exe 1336 msedge.exe 864 msedge.exe 864 msedge.exe 2292 identity_helper.exe 2292 identity_helper.exe 5184 msedge.exe 5184 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5712 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 5712 OpenWith.exe 5712 OpenWith.exe 5712 OpenWith.exe 5712 OpenWith.exe 5712 OpenWith.exe 5712 OpenWith.exe 5712 OpenWith.exe 5712 OpenWith.exe 5712 OpenWith.exe 5712 OpenWith.exe 5712 OpenWith.exe 5712 OpenWith.exe 5712 OpenWith.exe 5712 OpenWith.exe 5712 OpenWith.exe 5712 OpenWith.exe 5712 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 864 wrote to memory of 2664 864 msedge.exe 84 PID 864 wrote to memory of 2664 864 msedge.exe 84 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 2056 864 msedge.exe 85 PID 864 wrote to memory of 1336 864 msedge.exe 86 PID 864 wrote to memory of 1336 864 msedge.exe 86 PID 864 wrote to memory of 1536 864 msedge.exe 87 PID 864 wrote to memory of 1536 864 msedge.exe 87 PID 864 wrote to memory of 1536 864 msedge.exe 87 PID 864 wrote to memory of 1536 864 msedge.exe 87 PID 864 wrote to memory of 1536 864 msedge.exe 87 PID 864 wrote to memory of 1536 864 msedge.exe 87 PID 864 wrote to memory of 1536 864 msedge.exe 87 PID 864 wrote to memory of 1536 864 msedge.exe 87 PID 864 wrote to memory of 1536 864 msedge.exe 87 PID 864 wrote to memory of 1536 864 msedge.exe 87 PID 864 wrote to memory of 1536 864 msedge.exe 87 PID 864 wrote to memory of 1536 864 msedge.exe 87 PID 864 wrote to memory of 1536 864 msedge.exe 87 PID 864 wrote to memory of 1536 864 msedge.exe 87 PID 864 wrote to memory of 1536 864 msedge.exe 87 PID 864 wrote to memory of 1536 864 msedge.exe 87 PID 864 wrote to memory of 1536 864 msedge.exe 87 PID 864 wrote to memory of 1536 864 msedge.exe 87 PID 864 wrote to memory of 1536 864 msedge.exe 87 PID 864 wrote to memory of 1536 864 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1hEjGx7gjJ9Sj-CpMnVd62KqcTAtYR3Pp/view1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80f3646f8,0x7ff80f364708,0x7ff80f3647182⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3953704153136197114,10930394860987143669,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,3953704153136197114,10930394860987143669,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,3953704153136197114,10930394860987143669,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2552 /prefetch:82⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3953704153136197114,10930394860987143669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3953704153136197114,10930394860987143669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3953704153136197114,10930394860987143669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3953704153136197114,10930394860987143669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2136,3953704153136197114,10930394860987143669,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4988 /prefetch:82⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3953704153136197114,10930394860987143669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,3953704153136197114,10930394860987143669,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:82⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,3953704153136197114,10930394860987143669,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3953704153136197114,10930394860987143669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6560 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3953704153136197114,10930394860987143669,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6592 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3953704153136197114,10930394860987143669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6320 /prefetch:12⤵PID:5284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3953704153136197114,10930394860987143669,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6332 /prefetch:12⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2136,3953704153136197114,10930394860987143669,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5184
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1016
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5712 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\h2m_patch_common_mp.ff2⤵
- Opens file in notepad (likely ransom note)
PID:3228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5dfc5a604e8bac1be97d7abfe78758e45
SHA130eb06aff2b21d3e468b168365ecbb4f0e035cea
SHA2566a91e3d74911fd332cb096e7feda3d6f7c282bfa701b54c94858b42230e336ed
SHA512946b0cd1c5527d67edd7a90baf7230f772b3cfeda07753fe6c08ae39c354f88500bc5143ead41583a5681da0588a174398021a2245ffed258f3c88a16c886550
-
Filesize
3KB
MD5917497ba387a2717d24d9ded661d1306
SHA18d5afa624e43c75d4bc4bcecd6f632576c7dba1b
SHA2560a13349dec99907c7716ba5808f04ffda14955d15c43668036b74d7fc0627c27
SHA5129d01f50cccd104ebe5d387d82dea718c16b581c3e366deefa51a9c97c997983460acea4dd63f7890277eede2f1b8f19b75990a594beb353c39900411c7aef5bc
-
Filesize
5KB
MD55468a02abcf14cef899bca5dbf2bc7c0
SHA1aa40d32070c4f5bd6a0fdbfa07430a0874c8b576
SHA256e930a55c7959dbd88857cd19b766016b7d030f5168023fc3f322831313b279c2
SHA512bd3544023f9a0f94e83517b7d2b3b0a86c20607d0ce84b156df7300901f35c1c6d77765b5b7ecc8bcbde3dadbf04c957d4670a7d10a3d5a84bd3b96fa1a8c579
-
Filesize
6KB
MD5c1ebf8e5a4f1fec6fe490a5f9eaafb38
SHA164aa604ba093cf13f370db981ab4253f88d39059
SHA2565b80c84f70feda7dd811f63d0e33757d7b2dcd892f262cd0d2e1e892670a32b1
SHA512d786f0d1e723587a3000163848f3fc7548512b6b69ca4a67b11f1798957286483b87e211923ee70e27ab7032f497ca4b207c2b77643bb268fe9360c4a7fce458
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58769448cb4b10ba36edaca37f9768fef
SHA16e8df1c76eef269cb135ea27c55d9bbe71243de1
SHA256818bf771df03c67d32942f8d6fb32918bad88a1a4d60b94ffbce994f36416c04
SHA5129387d62cd80d1f4c9cdb00580a7c21dd7cafbf120dc621d3fcc200343efb35a3e348bd40b1cd7468bbcb1c4dbc8b2eea2ec1508d508be72c64676bfece6ba054
-
Filesize
12KB
MD57133b1f226dcf1386c4615d881dd5123
SHA19c914e8636d867e04a6565f256a3033a7a5ed46a
SHA256deba95e878d3e3bc4028f2c41e9eb1d6d23a59bee96f4a05816c9f5bba971b76
SHA51265fc3753a2476ddd3bae160620b116882eff030b374934c4433bd08fa2b41a30544fd0a2675134e7c497ea32e7d8ab19ff5586639eabdcd9d305adcf887b4cbc