Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 09:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1hpVKfBLdp_nvU6DoJEjXzP6CmL06AcaI/view?usp=sharing
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1hpVKfBLdp_nvU6DoJEjXzP6CmL06AcaI/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 drive.google.com 12 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 228 msedge.exe 228 msedge.exe 3844 msedge.exe 3844 msedge.exe 2224 identity_helper.exe 2224 identity_helper.exe 5972 msedge.exe 5972 msedge.exe 5972 msedge.exe 5972 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2712 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2712 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3844 wrote to memory of 4888 3844 msedge.exe 82 PID 3844 wrote to memory of 4888 3844 msedge.exe 82 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 4668 3844 msedge.exe 83 PID 3844 wrote to memory of 228 3844 msedge.exe 84 PID 3844 wrote to memory of 228 3844 msedge.exe 84 PID 3844 wrote to memory of 4076 3844 msedge.exe 85 PID 3844 wrote to memory of 4076 3844 msedge.exe 85 PID 3844 wrote to memory of 4076 3844 msedge.exe 85 PID 3844 wrote to memory of 4076 3844 msedge.exe 85 PID 3844 wrote to memory of 4076 3844 msedge.exe 85 PID 3844 wrote to memory of 4076 3844 msedge.exe 85 PID 3844 wrote to memory of 4076 3844 msedge.exe 85 PID 3844 wrote to memory of 4076 3844 msedge.exe 85 PID 3844 wrote to memory of 4076 3844 msedge.exe 85 PID 3844 wrote to memory of 4076 3844 msedge.exe 85 PID 3844 wrote to memory of 4076 3844 msedge.exe 85 PID 3844 wrote to memory of 4076 3844 msedge.exe 85 PID 3844 wrote to memory of 4076 3844 msedge.exe 85 PID 3844 wrote to memory of 4076 3844 msedge.exe 85 PID 3844 wrote to memory of 4076 3844 msedge.exe 85 PID 3844 wrote to memory of 4076 3844 msedge.exe 85 PID 3844 wrote to memory of 4076 3844 msedge.exe 85 PID 3844 wrote to memory of 4076 3844 msedge.exe 85 PID 3844 wrote to memory of 4076 3844 msedge.exe 85 PID 3844 wrote to memory of 4076 3844 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1hpVKfBLdp_nvU6DoJEjXzP6CmL06AcaI/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffae1746f8,0x7fffae174708,0x7fffae1747182⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17321613668004449799,6273953437606970020,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,17321613668004449799,6273953437606970020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,17321613668004449799,6273953437606970020,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17321613668004449799,6273953437606970020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17321613668004449799,6273953437606970020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17321613668004449799,6273953437606970020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17321613668004449799,6273953437606970020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2076,17321613668004449799,6273953437606970020,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4136 /prefetch:82⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,17321613668004449799,6273953437606970020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,17321613668004449799,6273953437606970020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17321613668004449799,6273953437606970020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17321613668004449799,6273953437606970020,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17321613668004449799,6273953437606970020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6272 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17321613668004449799,6273953437606970020,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17321613668004449799,6273953437606970020,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2940
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1784
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4cc 0x33c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD52b1d8edbef582ceed88b8f3e6833a7b5
SHA178e0cfc0b75521c69dcdf2d77e5c72c2f4db4f81
SHA256cc7ef518292dc65b501c17b43010106d8323b325497c936ba0ff0c64adaa80ad
SHA512addf564037c90edd0bae2953bc503091c05f5e6eadea090e5922f00acde2acdac64ab1993ee0794552c574b51cc798c7994d2f2bcbebedfd569703cec880d7ca
-
Filesize
4KB
MD565f762b23778fb42c2a053cbdeb6d127
SHA19851c83764d2a8603b1c44a02d2c5faf111a90e3
SHA2569f9909a920bce4b11623730e1e212a85b786fc642448221b860de6e23ccdbb18
SHA5121aed5055e12672521bc7b402065597fa7272cb0f398b8274c9a00304bf9603bce3517ad8e1a68b51f51040d261efb1b5de680ec2c75ef4d4386a09b4d31398c8
-
Filesize
4KB
MD542a5c6b7953adf7de64029264979ec49
SHA19b87e4a6f0221b720be9764b3591a92e66df2542
SHA256eb96e9bf54fe439faac09b822fc1eb8cbb42f591afe5bb73510f0b9edfb6cfb4
SHA512010f7a21eb8a85708d6152c297d535c3dc309fbbc9e60e6afc0e357c6295045cc5737e08e975ec429980b9027fbb17daa3b1517debe7e3e55966e0427f8ef331
-
Filesize
5KB
MD52703d663c607601a5f271a7ffd4a3e71
SHA18ae93c5775aa082f6914d404f9a40e718e126b9d
SHA2569b51706d3ba151ccaf2b33ee15c72f225337087e543304e2013d11b7c450e168
SHA512ee0b16160000c159e893ef96cf71ffbaa6e61eebfd56a0b3b0e29c73adfcde4bda10005161cc14c20d011561158cf8db5c74c7d29a477015e6158437fd1c4304
-
Filesize
6KB
MD59632173cdd462add5452033cbc6fbd90
SHA1a9c866a1ee45889281c6896a5b431b1f374c1c05
SHA2564436d91f6dfbd05f826b0365aa33b33f4ba4c69afad90c4e718c9e90bec84fda
SHA512c9bd13119e6306dd91a709a9d431ae095cd7b39970aae199087c347e7211c5a8d682732b67faf63cc0e475e09fae2915551f1ce676e8ed470e4520768de9930a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\0f4c87f58e3554965c14e5072f508889705a6c84\index.txt
Filesize97B
MD509463cd36febe1343f38ac71783be4bd
SHA13c609200f6a52c8566651c0563ee6ff8e06d7ff6
SHA25674d818e0ab942f2a794d361d447c4358a58ff755de68880bfcf7eb2244c6e55f
SHA512206e2812e88ddb96eb4b59df72caed98fa3973fc67ac7090297c38b4a90a5b363f39048ed727b78d48e5ce4d1e38cbb080f14ef706c052a601afaf4ebc57aae9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\0f4c87f58e3554965c14e5072f508889705a6c84\index.txt
Filesize33B
MD5b0195b619cd45d0f8af48fc59c3d7716
SHA1d153ae8be73da841309a68f26d26642d05ac20cc
SHA25637bb3e6cd75d830156a6934fa1d1516121b37b4a220705fe32adece7b7ed927e
SHA5126d917a97131baa380386bcf2c83dffb97f832e85f9510db3df4f7cdcc35396da58e5e098fbcf3fa7867b7909c09158d091ac0432919ca685ca5c7966b88a23c9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD589f1b82d1f20e96de03d4aa4ba7bb1b6
SHA1db5787714c972a9b9cae8914ea694b3b6dc28db9
SHA2562a9017c6991e8a2b6035759b2d54d4daebee3ea3345376060d5efa1a506f0b77
SHA512ff3044b3ef9b76065e3b950eb0d48792c521e24ae33b86adb56fc97ccabf71ec9efca7e7b4ed68920088e4069a4637309766b30629b58405226a2e7fec05c9d2