Analysis
-
max time kernel
287s -
max time network
295s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 07:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://qltuh.lyraevega.com
Resource
win10v2004-20240802-en
General
-
Target
http://qltuh.lyraevega.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 956 msedge.exe 956 msedge.exe 3572 msedge.exe 3572 msedge.exe 620 identity_helper.exe 620 identity_helper.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3572 wrote to memory of 3436 3572 msedge.exe 84 PID 3572 wrote to memory of 3436 3572 msedge.exe 84 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 5004 3572 msedge.exe 85 PID 3572 wrote to memory of 956 3572 msedge.exe 86 PID 3572 wrote to memory of 956 3572 msedge.exe 86 PID 3572 wrote to memory of 1616 3572 msedge.exe 87 PID 3572 wrote to memory of 1616 3572 msedge.exe 87 PID 3572 wrote to memory of 1616 3572 msedge.exe 87 PID 3572 wrote to memory of 1616 3572 msedge.exe 87 PID 3572 wrote to memory of 1616 3572 msedge.exe 87 PID 3572 wrote to memory of 1616 3572 msedge.exe 87 PID 3572 wrote to memory of 1616 3572 msedge.exe 87 PID 3572 wrote to memory of 1616 3572 msedge.exe 87 PID 3572 wrote to memory of 1616 3572 msedge.exe 87 PID 3572 wrote to memory of 1616 3572 msedge.exe 87 PID 3572 wrote to memory of 1616 3572 msedge.exe 87 PID 3572 wrote to memory of 1616 3572 msedge.exe 87 PID 3572 wrote to memory of 1616 3572 msedge.exe 87 PID 3572 wrote to memory of 1616 3572 msedge.exe 87 PID 3572 wrote to memory of 1616 3572 msedge.exe 87 PID 3572 wrote to memory of 1616 3572 msedge.exe 87 PID 3572 wrote to memory of 1616 3572 msedge.exe 87 PID 3572 wrote to memory of 1616 3572 msedge.exe 87 PID 3572 wrote to memory of 1616 3572 msedge.exe 87 PID 3572 wrote to memory of 1616 3572 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://qltuh.lyraevega.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb95f46f8,0x7ffbb95f4708,0x7ffbb95f47182⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,11153529043408107663,9616571701775893927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,11153529043408107663,9616571701775893927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,11153529043408107663,9616571701775893927,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,11153529043408107663,9616571701775893927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,11153529043408107663,9616571701775893927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,11153529043408107663,9616571701775893927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,11153529043408107663,9616571701775893927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,11153529043408107663,9616571701775893927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2184 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,11153529043408107663,9616571701775893927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:82⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,11153529043408107663,9616571701775893927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,11153529043408107663,9616571701775893927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,11153529043408107663,9616571701775893927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,11153529043408107663,9616571701775893927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,11153529043408107663,9616571701775893927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,11153529043408107663,9616571701775893927,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize744B
MD5d411dd4aafdbb37942d86f3a65c74b0b
SHA116f6041a96447600e4e0cb4b86bf55d433377a64
SHA2567da7dd6e5bd8f6371bebc07b9be888da66290530b28408fb5a11c130227f25ee
SHA5128b7f32f99cce0babff5807f93cd2eb5dea8c8fcb8f8108c0d7cdd43d51a63a31747092b2f900f8c70ff53d1269aabccc9b8b054d177ee6cf96b292cc2faeaa14
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD5b7c70e3553a814aa89a3fae4a06c9366
SHA1f642ceeba6c683f5d211272e236506341a20e88e
SHA2565ac4daddaff78e4f63f291e8e8e63ef72569fb41749a108b125829b5ec6fe20c
SHA512789c16306a1ac9b9d15912890e5395c232fbc310d9b74738e5de71228ca5c9248226aba75fb574cd9443413f1d5687677461a7a06ef48ed77c78640843de7025
-
Filesize
1KB
MD5d0790e371243aa4313b8dd26622889f5
SHA13677507a39b31c83f799b492538907d3ce7583a3
SHA256fdf73bde3b91e90d89aea68882f6105b0b19769b64df3b3bbd709708fb3c13c1
SHA51204ad7073b6a435e2759f8b0b0e922379c8c31222c5b66a0259add883ec0e056421750743b3b0566067aa69b7e840db839ef120b02ccd0cf3c4f05c436171733d
-
Filesize
1KB
MD5a206fd0aa85d41560b98f680c207ad70
SHA1762800166543a03ea00f8ce49e76941db3886352
SHA25691ff14cda82a28b8c49ac1ec63598459d480adeb4303a78ba13de9cdf420e09e
SHA51255480fdf969237ec3f07a14073bc74699ca3603a9a9f0e75e61be924b0f601d7866b155a77b74c20f3d3d42e3c077474305d35764d5328a9fed9ca653a8d30ec
-
Filesize
1KB
MD53ef59b9dc335ccf842d063972fb47a01
SHA1798d98075e207e2c7be1cbc75f16da88261020dc
SHA256625d8aef330428a9b1a6664b740031985dccd46b03c5654eed4f8a746fbdfb40
SHA51245e2fc587fec7f8bdac244c1acb5641e83d77ed1c790df13559b57ff752fd65e49dcc91546b54b6738aac1a467c59ffe591606ebe0725582af12fc3f2246f777
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD53851151107135ce9b99bc23901274a67
SHA1f8d9c7ab09d8fe34ca5a11ec4665905d4b392e07
SHA256b2f4ba012038d420e0be4a90823a7b8055b5992293aeded1efbd824f9aa8a84c
SHA5123ac3ed6d9508e185273afd8cd25f363434cf2f363422150063815db15c1d458f6f1e0c88e3698b0daaeb02db6e9e471aeda6f03cbb2974980885fef63e0a06fe
-
Filesize
7KB
MD598149d30a1e9c45362b7f02b29d4e7ec
SHA16de77ee31d0dc89671bcecbc706de6a4fa22d216
SHA25627f4324071d286ffc287a7b98f146af811583f670bea7efd6d50816163cd0c28
SHA5129a1a0ebfc1e7d29671ed58d76a70423ba65380b92a857e92dd485482a163d43e036f59e662b39138821ed96205e7915067b3531a00f1996e79642eb3bc5d0d74
-
Filesize
7KB
MD59a5d8f5283a064e27033878c9d42d1a6
SHA1b1aa5a5238a62649376f290330665a2638e1e1e1
SHA2562f4ec530f48f19688a68e1d1190988155f2e84161d7d1fec191691c48600b43a
SHA512aaba4f2427e3cbdea07452572ac6a9cb8613cad636577a805468dac31e772ea104d68f35e8499ada27a1a6821e643ac1126254ef663b1472f45d2acd4ebac7e4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d8ecf5db3b6ca74fb41936aa22cf3c6d
SHA1b707dad584016c1b21ba75fbd625bf6270ba23e0
SHA2563146bd417fdd398361e7ce6b659c67182db90c7d497cdb59ac9f3825d1c71988
SHA512cc99c6d1826db25e42e5d7b451bf3197d14948754ff31d5e07aea3b9ead71c5eff398d893929f721297cc7a31723914caad94eaba5bd2f51e0a8ba15627dd547