Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 17:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1k2OqqBaALyHKwlHxNYJCsH37QszwMARu?usp=sharing_eil&ts=6761ddad
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/drive/folders/1k2OqqBaALyHKwlHxNYJCsH37QszwMARu?usp=sharing_eil&ts=6761ddad
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 8 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 4812 msedge.exe 4812 msedge.exe 4216 identity_helper.exe 4216 identity_helper.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4812 wrote to memory of 3020 4812 msedge.exe 83 PID 4812 wrote to memory of 3020 4812 msedge.exe 83 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 4792 4812 msedge.exe 84 PID 4812 wrote to memory of 3116 4812 msedge.exe 85 PID 4812 wrote to memory of 3116 4812 msedge.exe 85 PID 4812 wrote to memory of 1968 4812 msedge.exe 86 PID 4812 wrote to memory of 1968 4812 msedge.exe 86 PID 4812 wrote to memory of 1968 4812 msedge.exe 86 PID 4812 wrote to memory of 1968 4812 msedge.exe 86 PID 4812 wrote to memory of 1968 4812 msedge.exe 86 PID 4812 wrote to memory of 1968 4812 msedge.exe 86 PID 4812 wrote to memory of 1968 4812 msedge.exe 86 PID 4812 wrote to memory of 1968 4812 msedge.exe 86 PID 4812 wrote to memory of 1968 4812 msedge.exe 86 PID 4812 wrote to memory of 1968 4812 msedge.exe 86 PID 4812 wrote to memory of 1968 4812 msedge.exe 86 PID 4812 wrote to memory of 1968 4812 msedge.exe 86 PID 4812 wrote to memory of 1968 4812 msedge.exe 86 PID 4812 wrote to memory of 1968 4812 msedge.exe 86 PID 4812 wrote to memory of 1968 4812 msedge.exe 86 PID 4812 wrote to memory of 1968 4812 msedge.exe 86 PID 4812 wrote to memory of 1968 4812 msedge.exe 86 PID 4812 wrote to memory of 1968 4812 msedge.exe 86 PID 4812 wrote to memory of 1968 4812 msedge.exe 86 PID 4812 wrote to memory of 1968 4812 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/drive/folders/1k2OqqBaALyHKwlHxNYJCsH37QszwMARu?usp=sharing_eil&ts=6761ddad1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb1f6546f8,0x7ffb1f654708,0x7ffb1f6547182⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,5098159736623247136,15359286166492044963,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,5098159736623247136,15359286166492044963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,5098159736623247136,15359286166492044963,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,5098159736623247136,15359286166492044963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,5098159736623247136,15359286166492044963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,5098159736623247136,15359286166492044963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,5098159736623247136,15359286166492044963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,5098159736623247136,15359286166492044963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,5098159736623247136,15359286166492044963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,5098159736623247136,15359286166492044963,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,5098159736623247136,15359286166492044963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,5098159736623247136,15359286166492044963,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,5098159736623247136,15359286166492044963,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0f44fecc-beb6-4444-b8c9-0a107b34f1c9.tmp
Filesize3KB
MD5c838b4866f4809902d70bf0718c71d4e
SHA16608de0b4c83be268a039f2abdafc16c6b6160b5
SHA256c182775ea126d6cf28bd3ae262f2ff8075f81e909bf84c709a60a207330b2358
SHA512aded4d5c10e01a51a8eddba0a9c9ee1e66509cc7e7a85b37dd1fc3524af653e64c2d87c993b8753ae747d933abd9c30c6191d83becb03c54d60d237f26550135
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD50f25f8ac44cad0cce59771661802ee40
SHA114d643a92faafa2a52381c130481e7d608174bc9
SHA256bde18671d091df3cf5e9a39c60c3f85fc8fb749ccd6d8e7bd9847b94a56310e4
SHA512b06a44d86bc48fb66e6c15c216f170676a2920b0f2d2121e71df8ab3102fcbd78101eeec9d541936027f23da892ab3a198e285268f24198302e739d2e9b2a71f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5cf082822274ae16cc7b38f3f46ea3bce
SHA11abe7d3ccf88ff569511b968a458c0aa5d1d3ca8
SHA256e18ac474deca662c8193f193c725a97a9a236fc355c564c23025bdfd831fa7ee
SHA5122edbc0ef9e9d5e1a059354e37f2456416539ec57851db9a722e44974eb1387248f364ccab7e024d432d3d99229a7c8b62e5f28d2992be1969e19d6d33a21b0a7
-
Filesize
3KB
MD5667d1a3c083d347afc71ba366b9c7dcf
SHA1a5d181db90a9766444d0378947ab344c8c7ea22f
SHA25640a67e46c8c5646d37b17b36ad1c4da781e7f19c970ceed86d6149c91616ffef
SHA512bf17df71a08b05d4647c1d7f8d56e06f93c48c683dd7c9906bf0aac9a4e72327df1920885f43fd9358a482e845d6532b98ba4b0db53c69d5fd06c6529b15b33a
-
Filesize
6KB
MD548fa6929c7ee53bc2df8998be8b39800
SHA14ade01b207b8becc9adb20223b89186ce7374549
SHA256832d54e05dd1799e53a21c1923e8c1b5b2f0244a061b70c824586d260dd89af1
SHA512f037052adca7ba76544c6db7d94b0a32017726e545db85322a3096169103042a3225ea0501421739bc36c3170160e38e43697bc99d5878c9d9473be248b75371
-
Filesize
5KB
MD59b8a75daf96d003583d8c6811503a1ec
SHA112388045d672102aa4d4cb1b909c8f54ec010b16
SHA256b79877086cfb78481b59b3ae23b9d36066f5992f682a79ee03ace548655f2826
SHA51274c7e5a885dce2666169b193e772161c2c5b3967f757da0e75c3a97dc025584cae97cd4f262f2a97f086e96b223c5af105e845e129a4fe0c1597e9dd7002f2ac
-
Filesize
1KB
MD5ea5a5f66c9010b0f0bdecd4bfa3079e9
SHA15f2fe1b1059d459fb7ae8bec1516a683abaef89f
SHA25642006fd8e0776b0d9224e44732759fbcaee451c7f0dd3535e5ccd102433807ce
SHA5129df81291e7b58331eebc97a1d22c1ac6a8a78f441fed928ccdf0be1e4c21b4becf9d092a6f8835ef27c71573dee20ae0413a3271606f7bdcc7d7ad0c5114fff2
-
Filesize
1KB
MD537f5fd7f9209a836090c042b057155af
SHA105996a2e437b6bee5f38f3144427312f7059292b
SHA25625bc60c53c29acadd8227f7277c90ebbbc436593ab08f19f7da34b3d3ff04d62
SHA51207270ae0c8d64147994ac40d4ba431815e2c59cfb196087f2eb21d5fe60db5a2919e686565c4c7e926950456c26c7da59856df975f29fb18d42b2a3c8161989f
-
Filesize
1KB
MD5d725cbae4f2a2843c05eefbd4318b254
SHA185ba4978c2694eaf9113d432a1aaad1ecf1af249
SHA25689a9beb02144ef522e58b3b3e4d8d428101c91d09f12e16acf1c2375a91f948f
SHA5128151c3e46f1af5866d183ed2773f38e196e015992e6f775271fc570027683da6ed54adcf7b70327f10b4aa251858de5ae879394e59b0b0079c5074c04bb38b11
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD520951e06a5a6d434f817627cd994761f
SHA131928b107fdbe80599035b1fc43ec0780d922226
SHA25604279a556f48363b742a0ffd602f64ed3c14516ea6b824c3cb2f852417cac6e0
SHA512f797050560c73a39ac39a8a9126730fff2874bd9d95eea4881fd8eb2da9138e4d253d97ecfbfc59dea0b8f7e01e3c160ff12dacb1a41678182db78775f60f341