Analysis
-
max time kernel
73s -
max time network
75s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 08:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://lcah.webex.com/lcah/j.php?MTID=mf7cb416a944f7c8ec94396d2ce114f82
Resource
win10v2004-20240426-en
General
-
Target
https://lcah.webex.com/lcah/j.php?MTID=mf7cb416a944f7c8ec94396d2ce114f82
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 545158.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3180 msedge.exe 3180 msedge.exe 384 msedge.exe 384 msedge.exe 4244 identity_helper.exe 4244 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 384 wrote to memory of 4100 384 msedge.exe 83 PID 384 wrote to memory of 4100 384 msedge.exe 83 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 620 384 msedge.exe 84 PID 384 wrote to memory of 3180 384 msedge.exe 85 PID 384 wrote to memory of 3180 384 msedge.exe 85 PID 384 wrote to memory of 1260 384 msedge.exe 86 PID 384 wrote to memory of 1260 384 msedge.exe 86 PID 384 wrote to memory of 1260 384 msedge.exe 86 PID 384 wrote to memory of 1260 384 msedge.exe 86 PID 384 wrote to memory of 1260 384 msedge.exe 86 PID 384 wrote to memory of 1260 384 msedge.exe 86 PID 384 wrote to memory of 1260 384 msedge.exe 86 PID 384 wrote to memory of 1260 384 msedge.exe 86 PID 384 wrote to memory of 1260 384 msedge.exe 86 PID 384 wrote to memory of 1260 384 msedge.exe 86 PID 384 wrote to memory of 1260 384 msedge.exe 86 PID 384 wrote to memory of 1260 384 msedge.exe 86 PID 384 wrote to memory of 1260 384 msedge.exe 86 PID 384 wrote to memory of 1260 384 msedge.exe 86 PID 384 wrote to memory of 1260 384 msedge.exe 86 PID 384 wrote to memory of 1260 384 msedge.exe 86 PID 384 wrote to memory of 1260 384 msedge.exe 86 PID 384 wrote to memory of 1260 384 msedge.exe 86 PID 384 wrote to memory of 1260 384 msedge.exe 86 PID 384 wrote to memory of 1260 384 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://lcah.webex.com/lcah/j.php?MTID=mf7cb416a944f7c8ec94396d2ce114f821⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99d5346f8,0x7ff99d534708,0x7ff99d5347182⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,820038756680011037,1598589122554801966,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,820038756680011037,1598589122554801966,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,820038756680011037,1598589122554801966,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,820038756680011037,1598589122554801966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,820038756680011037,1598589122554801966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,820038756680011037,1598589122554801966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,820038756680011037,1598589122554801966,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,820038756680011037,1598589122554801966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2092,820038756680011037,1598589122554801966,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5696 /prefetch:82⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,820038756680011037,1598589122554801966,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6176 /prefetch:82⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,820038756680011037,1598589122554801966,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,820038756680011037,1598589122554801966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6172 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,820038756680011037,1598589122554801966,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,820038756680011037,1598589122554801966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,820038756680011037,1598589122554801966,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:5224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8e342d76-fc6d-4c74-80e3-690c78970dd9.tmp
Filesize537B
MD526e39c4bbdc2f20bfb2a4919b4ca4c17
SHA119ee726f94948612cc50ffb567f3db5c4ce774ae
SHA256c6c0f8360aab554306968de9f08e4f7bd14433abdfa13ccc030e348f4768591c
SHA5128216e5885f3544e82ed796119f24006e4d4270e0be47c3f2c2f5ee02342b2ad8c832f7b22b095f0892589f187a5a03416f350b45e7345530c8f984933ac65f2d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD576f5ed154a41c7793337842ec6a9e5b8
SHA1a91948fda59909f9c67b092631c168ab16bec6ca
SHA256a638018befadaee23826a674145013168507777624410a91dc86086d672da58f
SHA51282974fd4ac09b740fd94782346f9c1ef7bfcd9e4ef3895c7238159af9922e1adef87faaa9863a38c2fe9f5bdc8ea122661970823e23db687c2a8eeb85e10bd0e
-
Filesize
181B
MD52849da4c6cf2ad210112fe970d542869
SHA11ab5aeb20d3224f508398b9d818d096104500ce8
SHA2565367e295b69da4283ea6b1d70c1fa5a5dd0c543c23b1d6fcfc57c8058649a82a
SHA512d243b92dda4f72560ddf3ec9cf547d21f1e7a16e0e9e9406553d0b81a3b2517eb629b15c0cd74b7e35f8d33ac7b1f4393de48558992ae09379d197a2b688ac11
-
Filesize
6KB
MD5e02622ddd1bd94e413b38cba1b7dca21
SHA1cf793f80173bd57cabd54ccaad4afb8698d2be51
SHA256b2f4305d299a7e97e6c615d5a5df4fa820ae9f58124f941772c70bca90f544ff
SHA512351af7f0912a675ea498eacb520e98d5da0828401cf23388cb3642bf4a1f2691967c8a1e6d7965156b94147ff8ad62170a659aa28c9ea6eb6a89c1e735fa2d0f
-
Filesize
6KB
MD58ea54f61bb9697c0642d44992ef893ed
SHA12f2e20bb0b4e43aea155663d04adabb4043869b7
SHA2565de8511c64a5f9f76e3e3073bac549e2cd25a4ea4a56928923ce48ecebc7b740
SHA5128be193f533df3a2376c18ceae7d0c29b4bd9a8053ed2f3ecac6ef9b55466551ebe204411aa2e5b99b86c8ee6a9612d5c04b692be93dc419d2fea0e22c39f7bda
-
Filesize
537B
MD5b6e39c4d4d51d57ea85090f601b02efa
SHA13dc9a6b5167bebc889b4ec3a6f7cf9ffb2d3523b
SHA25619d6c480465066f3982be0643703979f3d4fbbce8f94c9350ae6443aa0185599
SHA51247bc4d9e930776cbb48d2dc6bca5076400880df8737ccc8408648a4ac2b7a087b8123545bc7979ef67aeb7af6fdbe6d4272ce23b51795efc731681e7ed021d65
-
Filesize
537B
MD50577717fed46c35d4880ffe7b2a521a7
SHA16839e081c25b596e6a9b185764798c72aa02758c
SHA2562f8c279f7655f9b2aba28b72efb11df701459e69204ddd67086f61b1b099ddf0
SHA5127e99c930226ba46bc1d6c32d392018f819f41fe759c477aee3152ab3ca47804a2a68d787aa7acc068b6ca6c3a2cebce3f5d3d1bf461f5c989c0bc655139582cd
-
Filesize
537B
MD5af417e48849db29a00a43653839b5091
SHA132d4275338c4f96106bb90aa4dd43810d221dcb9
SHA256e7b873ab213d68bcc6c77d4ecba019395908dd4442abb1bd191cbfd3e3658eba
SHA512cf1fb80f8da2bf918a3d4a274cc17112474c3d814ff7e6b1daf520e639b74e0133da007ade356c706d735505c4caeeb74bec52b9c59b6f53b5ad2405522d0388
-
Filesize
537B
MD507aa8659c418ee71545f05dd88beffa7
SHA1a0ac652396b85003e8b2c670601cef18cc24032b
SHA256e2bee3a20d490014cced9d0165f205849f6c66658f47faf03061de2c057597ae
SHA5122968df0a3a3d7b1434386d46973c33e0ff943e5a0d5ce30ea442934eaab72843714b33263e290c647e0f85af9a53a91b12e122c345a42caeb0f8c9bbfb87c822
-
Filesize
537B
MD5ff142b496e8ab43ab34915686891c7c9
SHA1b5e5fe66c477879df90b4bb32799e07a554e8c0e
SHA256ffef0c119cb1c37718ed69bf419c45cfafc539f81fcbcace0321f3bdb9b325fd
SHA51243fafc3bf24ae639b8ba92c101609c066341989f9cd3186c8a6ec802a4ee87a310430ed745e8fa286e147884ccdb2310d7508bed217d222733a93a75838f708a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54801ee64314d8705ec847b871a17c9b4
SHA1cea27d0ab868f6a2fb353544c4f8cc535cc5d53e
SHA256393fdfe294cb532794f650d79ff336c11af13c3b8f9ae7418585db409ee9c5bc
SHA5124b2e2dd92f17427a098877539af38c0af954b76ec99c1e4cea0cd4698a50441908fc9bee13b7886abdcb1cf9a5e676f6eb5225b4d69fc9c5b058ed983ede3a83
-
Filesize
12KB
MD5a2c8e7988d50291a61c42a377132d1cb
SHA191ab531a1c5eeb278e62b75b9c7588b47449f08f
SHA256545f3e1e4d860e0d17c369faff92810f98daeb667a036390aeec5abaf2437734
SHA51249c600bbabf8675ce0978492524edcb289e0e1aee0fa0172461e59f9e1cfbb3f787ab21b4fc63f74a6f6d97e112c8d0694933c8cbf3338133deb653850ff7198