Analysis
-
max time kernel
124s -
max time network
126s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/10/2024, 12:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/FaHbIE
Resource
win11-20240802-en
General
-
Target
https://gofile.io/d/FaHbIE
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1808 msedge.exe 1808 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 956 identity_helper.exe 956 identity_helper.exe 224 msedge.exe 224 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5088 wrote to memory of 1972 5088 msedge.exe 79 PID 5088 wrote to memory of 1972 5088 msedge.exe 79 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 2928 5088 msedge.exe 80 PID 5088 wrote to memory of 1808 5088 msedge.exe 81 PID 5088 wrote to memory of 1808 5088 msedge.exe 81 PID 5088 wrote to memory of 3512 5088 msedge.exe 82 PID 5088 wrote to memory of 3512 5088 msedge.exe 82 PID 5088 wrote to memory of 3512 5088 msedge.exe 82 PID 5088 wrote to memory of 3512 5088 msedge.exe 82 PID 5088 wrote to memory of 3512 5088 msedge.exe 82 PID 5088 wrote to memory of 3512 5088 msedge.exe 82 PID 5088 wrote to memory of 3512 5088 msedge.exe 82 PID 5088 wrote to memory of 3512 5088 msedge.exe 82 PID 5088 wrote to memory of 3512 5088 msedge.exe 82 PID 5088 wrote to memory of 3512 5088 msedge.exe 82 PID 5088 wrote to memory of 3512 5088 msedge.exe 82 PID 5088 wrote to memory of 3512 5088 msedge.exe 82 PID 5088 wrote to memory of 3512 5088 msedge.exe 82 PID 5088 wrote to memory of 3512 5088 msedge.exe 82 PID 5088 wrote to memory of 3512 5088 msedge.exe 82 PID 5088 wrote to memory of 3512 5088 msedge.exe 82 PID 5088 wrote to memory of 3512 5088 msedge.exe 82 PID 5088 wrote to memory of 3512 5088 msedge.exe 82 PID 5088 wrote to memory of 3512 5088 msedge.exe 82 PID 5088 wrote to memory of 3512 5088 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gofile.io/d/FaHbIE1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffeb1333cb8,0x7ffeb1333cc8,0x7ffeb1333cd82⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,5183630190862440488,11768490988463036055,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1904,5183630190862440488,11768490988463036055,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1904,5183630190862440488,11768490988463036055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2512 /prefetch:82⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,5183630190862440488,11768490988463036055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,5183630190862440488,11768490988463036055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,5183630190862440488,11768490988463036055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1904,5183630190862440488,11768490988463036055,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,5183630190862440488,11768490988463036055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,5183630190862440488,11768490988463036055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,5183630190862440488,11768490988463036055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,5183630190862440488,11768490988463036055,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1904,5183630190862440488,11768490988463036055,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6132 /prefetch:82⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,5183630190862440488,11768490988463036055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,5183630190862440488,11768490988463036055,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6224 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1904,5183630190862440488,11768490988463036055,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,5183630190862440488,11768490988463036055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3572 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,5183630190862440488,11768490988463036055,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6328 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54c3889d3f0d2246f800c495aec7c3f7c
SHA1dd38e6bf74617bfcf9d6cceff2f746a094114220
SHA2560a4781bca132edf11500537cbf95ff840c2b6fd33cd94809ca9929f00044bea4
SHA5122d6cb23e2977c0890f69751a96daeb71e0f12089625f32b34b032615435408f21047b90c19de09f83ef99957681440fdc0c985e079bb196371881b5fdca68a37
-
Filesize
152B
MD5c4a10f6df4922438ca68ada540730100
SHA14c7bfbe3e2358a28bf5b024c4be485fa6773629e
SHA256f286c908fea67163f02532503b5555a939f894c6f2e683d80679b7e5726a7c02
SHA512b4d407341989e0bbbe0cdd64f7757bea17f0141a89104301dd7ffe45e7511d3ea27c53306381a29c24df68bdb9677eb8c07d4d88874d86aba41bb6f0ce7a942c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD584bd4c17db207b4d6b8a5205226c7ceb
SHA118a5806680629f888776be85327dff0b365389da
SHA2560857b859c33a271a623236e4fc0793e8d97566a378005f16fda3da9bdf8f9bd1
SHA5128019529a2bc31c1aaff61b21b866c7e24507fef547a333d773cd9e78ef0ab4fab8935034700d7d10e8e17990b65005e4fc086174e22754de9bbdbbf81c55c6b2
-
Filesize
391B
MD5d3dec18bb94719971f2fca51c7457284
SHA1fbe56fd514e178ecccb27b047e9c4a28f85969c4
SHA25649bf2e0fd563e5a70eef9e3826e4e676d36763b75a56a667b99d061d8e40c433
SHA512a5dbb443eb2e99435f0b302177eaee58b207806279d7c3e299371d401277bb0ae008902eb70075664976212571430c26febc7e47d71a47bd3a75829be5f9baa1
-
Filesize
5KB
MD510226efcbb3e2e47f9297429bb723777
SHA13b00214a7207c62f0e9ebfddb931525bea9142d6
SHA2568b306f1f12388149175b70a9b2af0bc110826c447ce3db5b492fb4f4ef71c821
SHA5126d0f171db98cac00b5520ea4d7d6c4cab93af580e889e7bd859ccf641e6220c4ea99c2c6d898d23682072ac07fb27257ef30e1daf25e252302b5e4e27b694f35
-
Filesize
6KB
MD53e42b4e2057e1ec3a73996f9ce78f52a
SHA18f447369db12cf23e192e54791a8b0620a628808
SHA256e6d06a80fd7bd7751b97c60538bc06a96cc77e5516f0371e799277515bab999e
SHA512c530d6196491c86d71ada239482648c520e0b709de04c3980705e85f3bcd9d9081a4101a22bd3a87ea3bba5619b44fa9ad09688ae5d3eea498188156f9513c56
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5bddcb87af35d4bdabc016ab63394758e
SHA1a764d6f3317c0b35e74a1b3b236f5cd7747a6e91
SHA2565692414ebd888436180a25148c468b38f0caedb9c0e0e3d0d86136eb85a12c90
SHA51286cdd2f15d2a795ffddb30fe3fc74caeb22739345bea67413b2d15f3e10a3a2e028518bdbdd6400a56663c03411518c002482953a3791c727c06e05da84f1ef7
-
Filesize
10KB
MD5f148f1c41a06c3be56997819d08bd251
SHA12a07feff64f20032a5b6c681d2eede2e77c4f0e3
SHA2565284984da2a8d7c3871aba505a6a6f825a580f03122d7d47e208896c03870f84
SHA512c34b7dc778b1950c2033dff3e188d04468f213966fa8a5dbf34af53a96b1f3772e04ad3a2027759c8ad3667a9676da719ef83b5bcb24fe81147ed02c5e4eb95e