Analysis
-
max time kernel
31s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 04:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://discord.com/channels/1247936455079104532/1247942068748292187/1277999379776802910
Resource
win10v2004-20240802-en
General
-
Target
https://discord.com/channels/1247936455079104532/1247942068748292187/1277999379776802910
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 discord.com 8 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-355097885-2402257403-2971294179-1000\{6F7E235F-BE11-4483-B1A5-7CFA495AE771} msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 2128 msedge.exe 2128 msedge.exe 4988 msedge.exe 4988 msedge.exe 3620 identity_helper.exe 3620 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2936 2128 msedge.exe 83 PID 2128 wrote to memory of 2936 2128 msedge.exe 83 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4608 2128 msedge.exe 84 PID 2128 wrote to memory of 4828 2128 msedge.exe 85 PID 2128 wrote to memory of 4828 2128 msedge.exe 85 PID 2128 wrote to memory of 4660 2128 msedge.exe 86 PID 2128 wrote to memory of 4660 2128 msedge.exe 86 PID 2128 wrote to memory of 4660 2128 msedge.exe 86 PID 2128 wrote to memory of 4660 2128 msedge.exe 86 PID 2128 wrote to memory of 4660 2128 msedge.exe 86 PID 2128 wrote to memory of 4660 2128 msedge.exe 86 PID 2128 wrote to memory of 4660 2128 msedge.exe 86 PID 2128 wrote to memory of 4660 2128 msedge.exe 86 PID 2128 wrote to memory of 4660 2128 msedge.exe 86 PID 2128 wrote to memory of 4660 2128 msedge.exe 86 PID 2128 wrote to memory of 4660 2128 msedge.exe 86 PID 2128 wrote to memory of 4660 2128 msedge.exe 86 PID 2128 wrote to memory of 4660 2128 msedge.exe 86 PID 2128 wrote to memory of 4660 2128 msedge.exe 86 PID 2128 wrote to memory of 4660 2128 msedge.exe 86 PID 2128 wrote to memory of 4660 2128 msedge.exe 86 PID 2128 wrote to memory of 4660 2128 msedge.exe 86 PID 2128 wrote to memory of 4660 2128 msedge.exe 86 PID 2128 wrote to memory of 4660 2128 msedge.exe 86 PID 2128 wrote to memory of 4660 2128 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.com/channels/1247936455079104532/1247942068748292187/12779993797768029101⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84d6646f8,0x7ff84d664708,0x7ff84d6647182⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3496 /prefetch:82⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3540 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:5192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:5400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:5408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,2806037068764559917,14241693243661398898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:5560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD524ecd7b92169a75bff28f506e8b9370a
SHA1d5c2edcd3d66262babf406e993fb0a690e9c0d39
SHA25640d415d738a293a34df05563e6ea346aa1eb428336c60fd816e4d2f79314426a
SHA51234d94c4224e6226b1ed38674492ebed98f7701617becb8294b1b10a10f0ba43c4b00e7420747d24e91570c72a9e7c0c83a532d83d3f1267a3a3aacfedd7c3356
-
Filesize
5KB
MD5ee8a0b847b3c18e0340c8eca7b2103ee
SHA1bbc28d9b8902c12c5a93ae35f86cbb2ba2bd98d8
SHA2563f73b6ac2c757647cc6bfd74a1a84ccd871aefe0212d69fc4b5a1d43f9ceb73c
SHA512d8598dc1113bdaf991bfa904f5ba5f4e65ac0473aa574d0f0fc4a69a10c0f67562f18ba8f3c8137f20e8c105b75aed8a42d745e4b9aa09c200311e5607a046e5
-
Filesize
6KB
MD565c72c31bd11b6b2f5a019b284fd7713
SHA15a761a31073fb288d95febbe8d84bb7ac995cff2
SHA2565ede5b73847c3c5d45458df4767911614268d9d945e2b239edd100dc7144b9d1
SHA5129c4b06653d4725582170aa1d38ce0606744c455bf69b6381a12d4ad08a6df0b229248f8efef6cf6f984144e87bb42a780a8fa39550fea770b9e5099e01e1dca6
-
Filesize
6KB
MD5bc8b4f60d0dedcc71c6574381b4d8cbb
SHA1654135eea20b612e4a208d5c62c9498c73e4a065
SHA256976c0e46068a5936522474af7c0f520c3cebce18cc4973e089787f5c06c0ac03
SHA51233ed3692b10b874e754f0efc1c295bf91ca40f373f67caae10d9ed0aa0061a868993033b81340f9af479db9fa314014b25812f6eb3ca6e7b4f8aaef95640902f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57863efe8059c2bdeb575e617b9bbfb7a
SHA110fe307124dab8bfab404febf6c49c3607105822
SHA25632e604546dbb4262f0285ec40983f1b7b117e234910b282bd1fb3d45bbf07f97
SHA512ab88baef877b677f1537138688ccc61c88165e26e77bed9182702cf452e312133e435ec1d0689182433efdfad168842a43c8719eb057efb1771d6c27c0deaa42