Resubmissions
06-10-2024 16:56
241006-vfp8xayfmg 706-10-2024 16:53
241006-vd57cavbnq 606-10-2024 16:25
241006-tw5svsxfrf 6Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 16:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/19Q6ZiDURQ-OpDHp5wnWyOTuV6xNZsog4/view?usp=drive_link
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/19Q6ZiDURQ-OpDHp5wnWyOTuV6xNZsog4/view?usp=drive_link
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 drive.google.com 11 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3316 msedge.exe 3316 msedge.exe 2372 msedge.exe 2372 msedge.exe 3428 identity_helper.exe 3428 identity_helper.exe 5588 msedge.exe 5588 msedge.exe 5588 msedge.exe 5588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 3064 2372 msedge.exe 82 PID 2372 wrote to memory of 3064 2372 msedge.exe 82 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 2740 2372 msedge.exe 83 PID 2372 wrote to memory of 3316 2372 msedge.exe 84 PID 2372 wrote to memory of 3316 2372 msedge.exe 84 PID 2372 wrote to memory of 4648 2372 msedge.exe 85 PID 2372 wrote to memory of 4648 2372 msedge.exe 85 PID 2372 wrote to memory of 4648 2372 msedge.exe 85 PID 2372 wrote to memory of 4648 2372 msedge.exe 85 PID 2372 wrote to memory of 4648 2372 msedge.exe 85 PID 2372 wrote to memory of 4648 2372 msedge.exe 85 PID 2372 wrote to memory of 4648 2372 msedge.exe 85 PID 2372 wrote to memory of 4648 2372 msedge.exe 85 PID 2372 wrote to memory of 4648 2372 msedge.exe 85 PID 2372 wrote to memory of 4648 2372 msedge.exe 85 PID 2372 wrote to memory of 4648 2372 msedge.exe 85 PID 2372 wrote to memory of 4648 2372 msedge.exe 85 PID 2372 wrote to memory of 4648 2372 msedge.exe 85 PID 2372 wrote to memory of 4648 2372 msedge.exe 85 PID 2372 wrote to memory of 4648 2372 msedge.exe 85 PID 2372 wrote to memory of 4648 2372 msedge.exe 85 PID 2372 wrote to memory of 4648 2372 msedge.exe 85 PID 2372 wrote to memory of 4648 2372 msedge.exe 85 PID 2372 wrote to memory of 4648 2372 msedge.exe 85 PID 2372 wrote to memory of 4648 2372 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/19Q6ZiDURQ-OpDHp5wnWyOTuV6xNZsog4/view?usp=drive_link1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff204346f8,0x7fff20434708,0x7fff204347182⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,15896461712718571212,4581338252095573242,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,15896461712718571212,4581338252095573242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,15896461712718571212,4581338252095573242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15896461712718571212,4581338252095573242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15896461712718571212,4581338252095573242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15896461712718571212,4581338252095573242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15896461712718571212,4581338252095573242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,15896461712718571212,4581338252095573242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,15896461712718571212,4581338252095573242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2064,15896461712718571212,4581338252095573242,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15896461712718571212,4581338252095573242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15896461712718571212,4581338252095573242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6160 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15896461712718571212,4581338252095573242,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6176 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15896461712718571212,4581338252095573242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15896461712718571212,4581338252095573242,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6716 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,15896461712718571212,4581338252095573242,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5588
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5dad7e79b138f9634c931a264b5790833
SHA1e9446fa544b4ceed27c5d65d26618752a3230e2b
SHA2561379c194044a303dd019e74801aaecbc06c4eda44f75bcb00cfdbae3e8c3818a
SHA51229ffba270d6fdd11b102b549601f4375438808d74c326dc21066d22f8558718415fc65ae09b363d27e1613e54fed24184adf5f6cfa95611d851b43123ce19412
-
Filesize
3KB
MD563daf7a4faee730e4e7532df0d5eabf8
SHA1579af78b03bb130d97c8c432be982fd370b133c9
SHA25641d8686a362f3e8d1a7d41d2d1f92603f0780af677f1b92a87ab6c22bf677722
SHA5124c2357197eb77bda143507047a3ca0922d3b0da1bcf7cdcba86e9302447a1ac89b7f2f36241f44d08974803bd55e48000db9c6535999b6572c1a637dbe51564b
-
Filesize
3KB
MD5998e31bc5b22f7f847d2bab8fcdfcbda
SHA12bde9b0ea108461646afa3cbdf02b1308ef54c10
SHA256023c98fdd5ae51ba82c5c3b35001d6d2181005461b7ea724acf7fba6f74c4a1f
SHA512028ad93b808d7ebcab8647f358525c592167daf3bd03facd993ef851a60d4723735813b4db787af5185c547cec157b48689b40ba2f2dcd335d4d2d86fe705fff
-
Filesize
5KB
MD58a4c7ee9670c20e7bf3a171b7aca69e9
SHA14ce60729ca7b891383ad9b3d63987fc358b7217a
SHA256b4c7c1c739d1adbdaf21d99abb4d09dc6f0125bdf169eef11a5ede12024fa58e
SHA512133ad2c9b9e4c7fc9d4b91b0015ac00c2f7460530444ad290e55425aabd0e7cc6c81360dcb2ad1dfc86f1c2ad851f4bbb7b69d40394b407126b7972a4974bee3
-
Filesize
6KB
MD556d6e48e3122c84898b304a4ae8ac5b2
SHA182aeea954514fc07fb10f16cff3b961f303d98ba
SHA256bc3bb93dea25c8f8d944f69108700bf2f66b21df6606d4396b794e7ba46d656b
SHA512cc6a45144d00149360d3cfeb419aea846ecb83459af5492fae6bf7b2692aeae3c50a09e9facd27b49a1045ffc8d5b044e33e48cce781a4b04dd5224dddf50120
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD509fb1a1d6a9f7564bdd6ee0658f78aab
SHA178d873928f4eb87b73eed7cd35237b7dc8037457
SHA25664516d7899bce17f5b57a629c730cc2a2db4b68923f61c5c90900d1305907292
SHA5125451ac6f64624f5ed9c9db8ebcce51b038ad342735a2b63356518857169460b72b70b0b145ece92109cf22054e828e1b6f6295bfa71e983370c10b7b645b2a38