Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 14:42
Static task
static1
Behavioral task
behavioral1
Sample
3ffc6db574ea6370870847ab4a91ca9c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3ffc6db574ea6370870847ab4a91ca9c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3ffc6db574ea6370870847ab4a91ca9c_JaffaCakes118.html
-
Size
49KB
-
MD5
3ffc6db574ea6370870847ab4a91ca9c
-
SHA1
c5108a88520ba5011e66775889f4c94af65d7e92
-
SHA256
2e8e929605c45ab0a15f75b05ca3e9bb10de3f8b58e2495142daacf55cfa847a
-
SHA512
4f244448f338c8d27193a7b00dc041abb1f330384be803a6423148370eb3a4c85737f62a055f57d3f53a1de73ba93162ffa34c3e99f6f89436aefc0f8eab0b8d
-
SSDEEP
1536:wB9jwpD32TifdEpZAwniU6wWOH+ED+K5mLl9Bu:a9jwpD32GfAVH+ESK5mlLu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 3984 msedge.exe 3984 msedge.exe 2760 identity_helper.exe 2760 identity_helper.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3984 wrote to memory of 208 3984 msedge.exe 82 PID 3984 wrote to memory of 208 3984 msedge.exe 82 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 3556 3984 msedge.exe 83 PID 3984 wrote to memory of 4820 3984 msedge.exe 84 PID 3984 wrote to memory of 4820 3984 msedge.exe 84 PID 3984 wrote to memory of 3844 3984 msedge.exe 85 PID 3984 wrote to memory of 3844 3984 msedge.exe 85 PID 3984 wrote to memory of 3844 3984 msedge.exe 85 PID 3984 wrote to memory of 3844 3984 msedge.exe 85 PID 3984 wrote to memory of 3844 3984 msedge.exe 85 PID 3984 wrote to memory of 3844 3984 msedge.exe 85 PID 3984 wrote to memory of 3844 3984 msedge.exe 85 PID 3984 wrote to memory of 3844 3984 msedge.exe 85 PID 3984 wrote to memory of 3844 3984 msedge.exe 85 PID 3984 wrote to memory of 3844 3984 msedge.exe 85 PID 3984 wrote to memory of 3844 3984 msedge.exe 85 PID 3984 wrote to memory of 3844 3984 msedge.exe 85 PID 3984 wrote to memory of 3844 3984 msedge.exe 85 PID 3984 wrote to memory of 3844 3984 msedge.exe 85 PID 3984 wrote to memory of 3844 3984 msedge.exe 85 PID 3984 wrote to memory of 3844 3984 msedge.exe 85 PID 3984 wrote to memory of 3844 3984 msedge.exe 85 PID 3984 wrote to memory of 3844 3984 msedge.exe 85 PID 3984 wrote to memory of 3844 3984 msedge.exe 85 PID 3984 wrote to memory of 3844 3984 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3ffc6db574ea6370870847ab4a91ca9c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3ad546f8,0x7ffa3ad54708,0x7ffa3ad547182⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16700812123478373263,12402324152460705181,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,16700812123478373263,12402324152460705181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,16700812123478373263,12402324152460705181,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16700812123478373263,12402324152460705181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16700812123478373263,12402324152460705181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16700812123478373263,12402324152460705181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16700812123478373263,12402324152460705181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16700812123478373263,12402324152460705181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 /prefetch:82⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16700812123478373263,12402324152460705181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16700812123478373263,12402324152460705181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16700812123478373263,12402324152460705181,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16700812123478373263,12402324152460705181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16700812123478373263,12402324152460705181,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16700812123478373263,12402324152460705181,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
64KB
MD563e5a0b45632b3dde3694ffcaf0e3f7a
SHA1923736d0cdc308331d5cfaa0ea159bfedc83d53f
SHA256889109910477919b3457416e7764bcd0add19fd959848253026125c7c35c43db
SHA5125b886c4b5122d61f0209ede748aa84445c9388cf38813316c41b3dbd2308216e88394d9a45cfc27113c0cf3bc93b9c37d808f6d3c67888244c176ee095d42259
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5b930653368ff97ce3240c021793c0bf1
SHA1474ff4de8966498531856908fcc084d540461abe
SHA2569a730c3b3541b7309cefd194600dbabd95eafdd1d969b69fdbb9f47019e1ae93
SHA5120f853591be0d5f62c54663614b2270f46906bd2bef9f2b8a81999af0e27e440a43e4a74cdd40e07270ab1910fb0e12f599d1b7bb5320c38c07172f68cad9dee0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD54273988dfdbf9bbaa8b9e2cb22835507
SHA17eb1063fa7cc203ab584d553210bba8c300a7fbd
SHA2560dcaa791e25271005cefffd6c45a87f6ca0a10b625f0bdee394ff103d1601e1f
SHA51250386060efe4ee18b334371fec0b3edb14229d7ddd0bf9dbba27ed079bde06b1e7d4051535dfead9ff7bec9e1e43a7b1a908be158c7a8a66437efb3e9c5fd44d
-
Filesize
1KB
MD5adedb54008cfd1728d9bfef6e0743f68
SHA13a59764c0a3d9a21b4aaeb038c5459d3f2a6ebd3
SHA2567c9ca7b8552743340cf48c70b5814226da983223656c01bbe8d7a6b10c9a4177
SHA51254d91c22a609f59fbc1518a495eca81bf7d18d22af04a0160d35fac7e30b78781a9d2d188d9de9e3e8640fd444e750bd69a664a97ed94a4ddff9184f9fed1987
-
Filesize
7KB
MD568959840b62d01aee8af6674afa3b1a1
SHA1d97c6802d6e1ede253f6dd5081e3266ff50aac86
SHA2566ed46bcd67574018d9421ce85c9df4105630283426d84b9f8bf54c84bf14e928
SHA5128e2211aa7c0e1d3a33ebf228caea0c26ac98fc869e8efeb85c98c85cced6f7aec626d5049e66f1f05083c681179d5effab2aafb416da0ba1776b384fef450da8
-
Filesize
6KB
MD5d73d0f8fa37303174e879a7132b95bff
SHA1a9300fb2a9f8a69cadfa6111269d30fb2d9a1fb5
SHA2561692d86df89bb8b9a86c02fc49f76c648a504476d9c0fb56b3e30a8ab4904994
SHA5126685b5f0eab138aebf9bc9d9b04afa07aa09eaf108887c9dbd01b1483405fecf9b08953487dda8874b06544b9286d0fce93e33eef5610c085346fa5963704ba3
-
Filesize
7KB
MD5fcb58e7e3a053e6d5e606ff952a3defe
SHA1b72bcd58e3666f32acbea53eea1dfb0e52661351
SHA256532a2aa4fbc18103fd2aceb3ac440316a262d9c7595139c24993763f9e97bf2e
SHA512dba0fa5c3d1e7bc4aebdc042a9614c6c5685c03ae6bd43920ea7905292a329d60383b227e8786fa0710f986967d9fe1a57edeada508bd955cbeffbd57341ad15
-
Filesize
7KB
MD54e200f93420afe27477be7ab2c09b2d3
SHA1acdfffb852b3d5db3cf8150d3b5673e00cff8831
SHA256b0b5a1985f0d6713609a0b8cf80d8a921d71aaabf898a25095aed4d8bdca0316
SHA512ea48e5aea5e9f844744080cf297356193a1638e2bcd333b59af4a579680ec1887b9147549aa54cdb668ae937d0d0a61f96fb90e5d255c23f247462f413fdee23
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5891f93262dc2c599f8372b66896625a8
SHA1fff2843f75c2376c0b9f052cbef631b52a794c55
SHA2566d7267865c0e29ba2c5c739a9f020d1fc55b36bcff010591ce468ce457df7e9a
SHA512a4eec91e8664847c7c54e72a3648eb7e849bb8ee594a63c278c9f63eaedcdfe5c87ac9b1078e501e6117ae38df8864f640094cdf27cd9f29294e5f2abfffa0a3