Analysis
-
max time kernel
70s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 15:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1Kc4VnAtUS3zf5StTSTcCmaxuHxAOCllD/view
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1Kc4VnAtUS3zf5StTSTcCmaxuHxAOCllD/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 8 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1212 msedge.exe 1212 msedge.exe 3696 msedge.exe 3696 msedge.exe 1420 identity_helper.exe 1420 identity_helper.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 2708 NOTEPAD.EXE -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3696 wrote to memory of 4228 3696 msedge.exe 84 PID 3696 wrote to memory of 4228 3696 msedge.exe 84 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 3880 3696 msedge.exe 85 PID 3696 wrote to memory of 1212 3696 msedge.exe 86 PID 3696 wrote to memory of 1212 3696 msedge.exe 86 PID 3696 wrote to memory of 4968 3696 msedge.exe 87 PID 3696 wrote to memory of 4968 3696 msedge.exe 87 PID 3696 wrote to memory of 4968 3696 msedge.exe 87 PID 3696 wrote to memory of 4968 3696 msedge.exe 87 PID 3696 wrote to memory of 4968 3696 msedge.exe 87 PID 3696 wrote to memory of 4968 3696 msedge.exe 87 PID 3696 wrote to memory of 4968 3696 msedge.exe 87 PID 3696 wrote to memory of 4968 3696 msedge.exe 87 PID 3696 wrote to memory of 4968 3696 msedge.exe 87 PID 3696 wrote to memory of 4968 3696 msedge.exe 87 PID 3696 wrote to memory of 4968 3696 msedge.exe 87 PID 3696 wrote to memory of 4968 3696 msedge.exe 87 PID 3696 wrote to memory of 4968 3696 msedge.exe 87 PID 3696 wrote to memory of 4968 3696 msedge.exe 87 PID 3696 wrote to memory of 4968 3696 msedge.exe 87 PID 3696 wrote to memory of 4968 3696 msedge.exe 87 PID 3696 wrote to memory of 4968 3696 msedge.exe 87 PID 3696 wrote to memory of 4968 3696 msedge.exe 87 PID 3696 wrote to memory of 4968 3696 msedge.exe 87 PID 3696 wrote to memory of 4968 3696 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1Kc4VnAtUS3zf5StTSTcCmaxuHxAOCllD/view1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a8d346f8,0x7ff8a8d34708,0x7ff8a8d347182⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14101412972310905640,12448143126885151221,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,14101412972310905640,12448143126885151221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,14101412972310905640,12448143126885151221,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14101412972310905640,12448143126885151221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:5596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14101412972310905640,12448143126885151221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:5588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14101412972310905640,12448143126885151221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,14101412972310905640,12448143126885151221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,14101412972310905640,12448143126885151221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,14101412972310905640,12448143126885151221,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14101412972310905640,12448143126885151221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3768 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2092,14101412972310905640,12448143126885151221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14101412972310905640,12448143126885151221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14101412972310905640,12448143126885151221,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14101412972310905640,12448143126885151221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14101412972310905640,12448143126885151221,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6408 /prefetch:12⤵PID:1456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4324
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5020
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3212
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\live2d (CRACK)\live2d (CRACK)\instructions.txt1⤵
- Suspicious use of FindShellTrayWindow
PID:2708
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\Downloads\live2d (CRACK)\live2d (CRACK)\rlm1221.jar"1⤵PID:3472
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\live2d (CRACK)\live2d (CRACK)\instructions.txt1⤵PID:2132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD581611418e05df101b4339311873db224
SHA1aa264d6ea0fb67009237227fdaa6ec268822c1c5
SHA2562802b5feda0e0b2b7ff26422643a14bac3e3f3dcf2b7454891053d0103710986
SHA512f674470bca81297d485f5fbd695c558db88e14c9cd7c72500d98fe4e48a89f3bb14026136f9308ff32a5402ae6cedf20f91e6403e944a4d8d9cf674fab602cfd
-
Filesize
3KB
MD56a6109b540dce9d67e1f45af967fa1ed
SHA1964f11fd9314ed0e125e44c4c2098e94b2150d12
SHA2568614b1a2736e020dc8f38785719aa58ba38cbd2718f3b374b85056b335a7912f
SHA5127fa6bb38f88e36fb5935c35308f698c453a7a689a274802363b72b5c398e426407a3600c0b3900e30180afa4c2fc84781972f352b5aa308a36a823ec48b8ebfa
-
Filesize
5KB
MD53c35be4c770045a1041c63d99266faf1
SHA163b72f409cd239151889e79c6bfe3cbd4f7f9d22
SHA2568323a011d23de9e87de138f842a5bbeefc17c89d42e01196c806681c8c1e5a1d
SHA512f4fcac1b7a710ab480066dbe694c47680441f113e1e4f49725688f859bcd8d2ba4fff0744f0e8d0ab0c40cd37dac0616c9b97a7a27078e313b19476544714f83
-
Filesize
6KB
MD51ba6629a18454c46eaf9a659ee92a542
SHA111378679b2d01a77bba2ef53435c0d4f695ee3c6
SHA2565ca951bfe120b302680c835610c2336806700488e66d0ef198942c57f24fcfeb
SHA5129f1b9e5cbc99a9ac9172ac26dc9254a627c25273e913582023a20e3e54c70ea8c89595c2ff48c56aae12e72f5cc9c1f7b2a7c4cce1ca74720ab58d6d2b19de88
-
Filesize
6KB
MD5ac4c06fb2d3bf0274b9108224d1bf5b6
SHA1bf121aa7a679921a4df16451886e07cc09e6aa9a
SHA256dd1434bc605102cc60c270402bf7f5a1ef24c9b84e3ad98e3411139489a6df32
SHA512f049c675dd655d32aa819ddb34ec2eb692ca73c7c8bc2da65056689e01db5ed8dcc74646800cef9a36faf37e5a8f8806cc259ee26149f7189a43118eb4d22b41
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54d8577c8f96c047b84e557e13be7caf0
SHA19b1cb19d03ea50c9006cee5653df025ab3951639
SHA2563533e809df571b5457d1d9c29f4375c57f99a3863ec7eb2416d623d40662d486
SHA5127c00e8e4181d4e553c2e079d0b662a626b9d9dfd526fc426a3bc9636ebad21e794402e3b03da382d6a24382a8ab0d59da43eb071220023791aac24bae01ac836
-
Filesize
10KB
MD5603c4553f9fb9977bfa06a2a70f05e63
SHA1238e6b338b0c8ff41f101e2d57ec31e116246ea5
SHA256eba7ce62ed21f508c0285df54fd678fc9560db34b28ef1fcf194b666c68b768b
SHA5121979012b308bdbc6b0d1e5b8fdca225a4c2c9b3c0bd6f8672f65944b1ba058227a88423e347502bda41241ae3fa3d0d24fcc3d89aad98270848b01c863edc3a8
-
Filesize
15KB
MD568195f917ce3d2f50bb4cfc75ae18ef9
SHA1a81b74d3ea0c4201419c6cc8add01971a4ce1653
SHA2566d7a4d615f86f52bceab6c09c70de2df515d98d0df8c4efc351f5b31769ab88c
SHA5125721cd32884506e4fa46071246c77f4429428af6fd33107616a35767e5cacf796d4c822adec861e0ac180a9a5b43f66f1837d6c4902b5ba47644f6a41c5cb318