Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 08:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.atlassian.com/software/statuspage?utm_source=email&utm_medium=powered-by&utm_campaign=status.openai.com&utm_content=SP-notifications
Resource
win10v2004-20240709-en
General
-
Target
https://www.atlassian.com/software/statuspage?utm_source=email&utm_medium=powered-by&utm_campaign=status.openai.com&utm_content=SP-notifications
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3832 msedge.exe 3832 msedge.exe 3220 msedge.exe 3220 msedge.exe 1808 identity_helper.exe 1808 identity_helper.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3220 wrote to memory of 2156 3220 msedge.exe 83 PID 3220 wrote to memory of 2156 3220 msedge.exe 83 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 1476 3220 msedge.exe 84 PID 3220 wrote to memory of 3832 3220 msedge.exe 85 PID 3220 wrote to memory of 3832 3220 msedge.exe 85 PID 3220 wrote to memory of 3528 3220 msedge.exe 86 PID 3220 wrote to memory of 3528 3220 msedge.exe 86 PID 3220 wrote to memory of 3528 3220 msedge.exe 86 PID 3220 wrote to memory of 3528 3220 msedge.exe 86 PID 3220 wrote to memory of 3528 3220 msedge.exe 86 PID 3220 wrote to memory of 3528 3220 msedge.exe 86 PID 3220 wrote to memory of 3528 3220 msedge.exe 86 PID 3220 wrote to memory of 3528 3220 msedge.exe 86 PID 3220 wrote to memory of 3528 3220 msedge.exe 86 PID 3220 wrote to memory of 3528 3220 msedge.exe 86 PID 3220 wrote to memory of 3528 3220 msedge.exe 86 PID 3220 wrote to memory of 3528 3220 msedge.exe 86 PID 3220 wrote to memory of 3528 3220 msedge.exe 86 PID 3220 wrote to memory of 3528 3220 msedge.exe 86 PID 3220 wrote to memory of 3528 3220 msedge.exe 86 PID 3220 wrote to memory of 3528 3220 msedge.exe 86 PID 3220 wrote to memory of 3528 3220 msedge.exe 86 PID 3220 wrote to memory of 3528 3220 msedge.exe 86 PID 3220 wrote to memory of 3528 3220 msedge.exe 86 PID 3220 wrote to memory of 3528 3220 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.atlassian.com/software/statuspage?utm_source=email&utm_medium=powered-by&utm_campaign=status.openai.com&utm_content=SP-notifications1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0c6a46f8,0x7fff0c6a4708,0x7fff0c6a47182⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,11868418949639987064,10792634078617326136,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,11868418949639987064,10792634078617326136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,11868418949639987064,10792634078617326136,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11868418949639987064,10792634078617326136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11868418949639987064,10792634078617326136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11868418949639987064,10792634078617326136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11868418949639987064,10792634078617326136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11868418949639987064,10792634078617326136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,11868418949639987064,10792634078617326136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,11868418949639987064,10792634078617326136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11868418949639987064,10792634078617326136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11868418949639987064,10792634078617326136,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11868418949639987064,10792634078617326136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11868418949639987064,10792634078617326136,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,11868418949639987064,10792634078617326136,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2668
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD58912bdf028695e1fce753fa2e54a7de1
SHA1be748804a3701203584a581b43470ee97ebfbea9
SHA2567608eccb049771af947a0be2981e447c0a0392ac293cd4be9409af5eaaf7d899
SHA5128d007fb9b445c6dcb8a2214ffb5698ad2a290014fc6f14b76214cf9deaf53f85f66e0eaed0a6e54381c6cffd9c66e691581febffbcb0cc0950da8883efd2828f
-
Filesize
5KB
MD5a32f240204c45c7e757510eb31244552
SHA1f8f88863aa834856d3464ef4fd8d83068b839cb8
SHA256f295dc3abc32112c1d9cd75e40a7d6682dad338a1e432f5ac5b9b95b94c87d17
SHA512db8b6b12d05cc546df7c2b46c625a4ca83e89e0c25378dbc273d25e3adf880011c1eb3e0c68e10edcc89e7d494e0a9644838e612b804e166d28cfa6303bc3f8e
-
Filesize
10KB
MD5c641a6b8307d3fbe0724e52cef2b95b6
SHA181dd609d473537f3ff286912a7e09a611d57b5e1
SHA2560f6cad7c17bf8d623510b4d7cf325569d85383b1d78d570e7ebee636ad664651
SHA512312a04a7c5693e7a4942d39a26de77db7b9b95d418ee2cb4aa5b0c38f5f06ec2ae5e48409fcb3d94f6a9aa96e3029adc58f61f93dc4e9ffece264a10257add7f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\274d1d1f915fafc8567179954271fe742319fe99\index.txt
Filesize160B
MD5b5cad30a76dce2509e8fcf641a65283a
SHA1780ba4e8fce7808243d5ef7e68a1296ce1e35dc6
SHA256063a415a5a1b3b329716b07136ac39d60df884e42e33253b9ed4a89aa95cf890
SHA512f4c324460b552a871052f2c009762b09f5cfef195c87e2cbc9205c9b589ca191f5ee699d98cae4de2d9f06da7baf72d369e821f3554ba1887e2e600c059f4bfa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\274d1d1f915fafc8567179954271fe742319fe99\index.txt
Filesize153B
MD58b4132719719c6497da4d94a528e074e
SHA11961059be275a04abdeb53beb7b0d30b608cd7d3
SHA2569865347b83298cf8aeea3a0528cfb6d880fc4507e9b6ccd9d03a1bf2d98157e5
SHA512bb3bd140b0c6885beb033743b5b731609b069d0c3d25ae6fa1484a73938b186881d40739d345a427d050b8c5bf56d570c17e461134105695bfafd8dd6ab609b8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\274d1d1f915fafc8567179954271fe742319fe99\index.txt~RFe57a0a5.TMP
Filesize94B
MD553479eedc44e0d8218814e35084b3960
SHA1006e6b99d16b085982f479819dda4fcd38f22a94
SHA25652b1b9493f0015d6e882c702669e527eb4bf22b3449dfb0d952e71e6bce939c5
SHA512231c881c9a588bf0bf7f0f7e5488e52221dc9554af7e0eee2d4ade46a8b14b9a5f0647cc944649d3555908ce1c4230cc0213172e08cb8bd8fb3bd6e781e12f3b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e5f39609-74d8-4103-aa96-76d005a96896.tmp
Filesize6KB
MD511b3406808c3385025ea3313536977f6
SHA14d4da575f6011eaf49ee26c86d5e8d7d564eb335
SHA256b6fd99bd9eabd47cc1d6406c33ac01e7942f2fab16cb57a2ac2ec501561118f3
SHA512b89034c9555e6b7534ed273c2e2975026ae0c41878f40963461dea366e9b4b119615a2d6afbecf2fce91db455ce1e67f728da16c9e7db23e0aaf8c9522885b92
-
Filesize
11KB
MD548e70b146f976f12d52427d9ca4608e0
SHA15d29c62f4f7195cd7a49ff783eac06a485fea9fb
SHA2562e4c76b0bc066cf2ab4cc5d67c8fcd3f3c6efc162d79d4679c7f97136f310979
SHA512fcffec61310778c129c8bfcfa6806151c265b4773b87c9beb40edfc80a7179dc034c118920c75438af06b6d12402ef66da985c7348b11eaa3f71e7175907fc99