Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-05-2024 01:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bafybeidzt57ospoue2hu2oyww36komo3q25mhmwszmdeqrp3fzl255qjq4.ipfs.cf-ipfs.com/webmail0403.html
Resource
win11-20240508-en
General
-
Target
https://bafybeidzt57ospoue2hu2oyww36komo3q25mhmwszmdeqrp3fzl255qjq4.ipfs.cf-ipfs.com/webmail0403.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 2348 msedge.exe 2348 msedge.exe 660 msedge.exe 660 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
msedge.exepid process 660 msedge.exe 660 msedge.exe 660 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid process 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 660 wrote to memory of 4312 660 msedge.exe msedge.exe PID 660 wrote to memory of 4312 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 4864 660 msedge.exe msedge.exe PID 660 wrote to memory of 2348 660 msedge.exe msedge.exe PID 660 wrote to memory of 2348 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe PID 660 wrote to memory of 928 660 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://bafybeidzt57ospoue2hu2oyww36komo3q25mhmwszmdeqrp3fzl255qjq4.ipfs.cf-ipfs.com/webmail0403.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffff5f23cb8,0x7ffff5f23cc8,0x7ffff5f23cd82⤵PID:4312
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,14795160005904939166,14553562943501440099,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:4864
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,14795160005904939166,14553562943501440099,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,14795160005904939166,14553562943501440099,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:928
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14795160005904939166,14553562943501440099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4188
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14795160005904939166,14553562943501440099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:836
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,14795160005904939166,14553562943501440099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:3188
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,14795160005904939166,14553562943501440099,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e4bf11ed97b6b312e938ca216cf30e
SHA1ff6b0b475e552dc08a2c81c9eb9230821d3c8290
SHA256296db8c9361efb62e23be1935fd172cfe9fbcd89a424f34f347ec3cc5ca5afad
SHA512ce1a05df2619af419ed3058dcbd7254c7159d333356d9f1d5e2591c19e17ab0ac9b6d3e625e36246ad187256bee75b7011370220ef127c4f1171879014d0dd76
-
Filesize
152B
MD523da8c216a7633c78c347cc80603cd99
SHA1a378873c9d3484e0c57c1cb6c6895f34fee0ea61
SHA25603dbdb03799f9e37c38f6d9d498ad09f7f0f9901430ff69d95aa26cae87504d3
SHA512d34ae684e8462e3f2aba2260f2649dee01b4e2138b50283513c8c19c47faf039701854e1a9cbf21d7a20c28a6306f953b58ffb9144ead067f5f73650a759ff17
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5d3d9312d797ea1a739f511ef171059ef
SHA1e4d5b55bdfcf36ecfdce62e0bcc7fd80858f0a1d
SHA25657a0ea27cfcd56d7ea407c475d6cfa1604c82439dd6b64a18ad82c065a634604
SHA51217226e1132bcb817a737f91dfa33b458a81a0dc4816d3e1ec424c6bfa0f384d6b35d925561f4dcd13dcc691f058448345b02e0488e2560364e863b4e95361129
-
Filesize
1KB
MD5fd41fd9a97932fa3a4aa68b0791fe8da
SHA13967996a5453fc9a19f12f138fc309321258844d
SHA2567ee24bbfea21442c91b4bf9a7a17b1b1aa9428e914bd07d302360647e2cdb5fb
SHA512a8a9cf9dcbc1d5737e7d64684a320ce8063fa5b9f5e2754190de7389c3eceaaef82eff495dc31780b75f8850a5005c352eec7933d27fcf25b8c13230902669d9
-
Filesize
5KB
MD53f72cdc0f8c24bcbdb0ab7744f698a2a
SHA13d9da60a572b30c4b4b2e3a0df93668c63b2c43d
SHA25649074f0a40a614b0460fe97e681cf3f4ce7e7c0fbb83db06881416b19ec3cff7
SHA5126d326e3df774a24473e0e8520fd68e4fa903cf8c4f54928953c467a69e30461048546aa30b2bf4d7c563322d7a3650100430548500fd155539eefd72f4ddbeac
-
Filesize
6KB
MD5bd9c6d8601504bc89f42cc11f5f0b495
SHA1ef00d71567e66a389c6abcf89b40f2e2796a3617
SHA25636735a09f6073cc3fdd8b8614aa2519afd004193e572de3a8d2133d8b3326abc
SHA5120aae37abd4008bf4ce1933d8d364142f659e48ee214b2f05914e24c6c0d25ce198a92519608809d759cbbdbdb5a106c8cb951ec327799ca3b8d604086b63a4ab
-
Filesize
372B
MD5459f254063002de846e0f76eea5cf7cb
SHA13aa63e65728f76a06bc7411464b4e7ac26cae126
SHA25618a1a53c158e0f10ed912345034bbbf57584745ecbb79fb33c9d4a69c17ad19b
SHA51238bf865980f764017ef12d96afd53ad9b5281ad38ead651608df45244cf3e69b6a14c6de8776fb38ef38a40a565b65408284815e8242c0c1b767e10d749f679c
-
Filesize
372B
MD553c902fddfb4920c30a5bfe672d8a6c2
SHA10642096d012bc2c9058f0bcdc395962dee7cc20f
SHA256b8fa4462f25b438b30900feaeefbc006fa27a8cc15213f78c1ddab7a6476f985
SHA512ad612d53846860a420387dadd8bf18b8c20ef88affbe0a8130eb103cd8dd0dd25409ad15d80fba1ce92dc7771902496aaff43eeb8317a98d566dae95de76b5b0
-
Filesize
372B
MD504f98e3e76912a671ea2aa013af45f02
SHA1bc32bf7e95bfa3f8e14e1cbd8ad3ab4e52f167a7
SHA256e9ee8c5427d1c13103ac707c73dd544cb640551145b9c4f89528be46c0faefcb
SHA5126e0bd7abbb47b1343830fe1bb91fe5e85601f310c9a0c6654317a3296965d605d76910805848d8fd916ca4c3757ef5bcdef3eb5fe82535c69c6f0b6cba73646e
-
Filesize
372B
MD5d8f9ed2f50fc56b80d7467948175a621
SHA110c174081cee9afd3a4e376154bdac915c198135
SHA256142b141cbca2f6fad3f4d60081e2af0516eded4df2d9270092fdb1cb430899c5
SHA5123710628d2c51a3dc39ab076de0a4b7e4ccb4b381cbd6ce449703a1a4e1c1fa1fb4bc24a9140c72cae8e2e909df5e70d2d1dfe02d8614b6a5a53363fdab0e7326
-
Filesize
372B
MD5c5e64c30d2c8c7a14daa212187564201
SHA1aded0d72ecce0655fc7ca9df5de890a018cc5966
SHA256ed63f5a64e08bcfe62c439cdac9a4ba9de0e937a82d73eb65b47f80aaea95d9d
SHA512f4d02c1a5d4f5ba02948926845143541001c6b7c060dd8a7193e57e4e7f8f20c742215b289cf37afd0a6109a4b288d7a4d401d560c56463bdd047674307feba4
-
Filesize
372B
MD5fe98d181e0de228705266d3bd710d064
SHA1484a590a27d924ecf3f4bb65f66ebc0163e6e13c
SHA25634064b37cb39adc881343f9910adfec7542be37f50325ff029f4349c454ba62b
SHA512ea9de5c4fe2baaf45c7bd464a76743f0a01e22b9a2d4b5e8d5ab543a65d17b60f7eb6aec08c8bb5267b250596f876e5357e358abecb9c93e8a4eb227cbd58474
-
Filesize
372B
MD5925ddde3a4430da8d5c5185045024e92
SHA1b478b03a6d50705ec016c3e85863301025986867
SHA256edbdedf190306ce3b932d8f7a6ff86fe628b6ff2b0fb9a093a0a0764f6b78306
SHA5124c32bfc46a961f979abae75c702c1224f105f84fea8b0b7b15605b2a73dd921b83659e82ab9d9173eb37c9a6d38128d1a65b4ec32ce4825e3a43efbc07c49e48
-
Filesize
372B
MD523a76c5e7c064530d330dc9fe0139b17
SHA134be5195cafef3ed9cce572cd513b7bd41d8d7b5
SHA256b927023c92f84e4cac77ddc33cb8acb14f0c14f01480574f68ff64c912ecfb0c
SHA512de61605c7b2a35eb2ebe3db962a3cd9c9ffebecfa2a89f06a37147f8cb57d0e57ccf4f68ff24823497a0b592a60a64c2dc45427bcbbc710ef0f7431b04c4b7d0
-
Filesize
372B
MD5b89be11eda1c4df8c84924859206c3f8
SHA1c4e598e66110cc6d338935a8b0f7fac6385fe8c8
SHA2567be6dde9f9ad4256719aa7b91732496ea68b4d21c75788ea17ac759102ab719d
SHA5129f6ee58dbde5656442b4cc8fea4ba9d7a49a74ea1104ad072e173d1456e3c631bf5a2bd9ab1cc5ea92d8d56fd4344ed54fddbe15be829d067942df43ea4d3387
-
Filesize
372B
MD5f9cd88ab7f0ad1eed63201e45f0e0592
SHA179600f44fff74c70ad82767e2f3ef02f55698558
SHA256c35aa098f57eab188941935ae10a79f610112d8b23659d9875815b023653a1f3
SHA512310f3e42316122b5609851afa70d05d12f266bdca43c0c8d37aad0c55ac6be2d83292331bb9d8d07963b69697d487e5cf15ccb0605ba7fb56e08b1b293721409
-
Filesize
372B
MD597ddc6f703b8ac445b26f61d65a565b3
SHA114f09d0b8708b19aa18cff2e3914674329de885d
SHA25676ab01c4a69dd4689c38bc81cd5be41e8200421284c46bbae00cd471c321256c
SHA51296ec8ee8c0559a3e3ebeefdcf30061fb4884e671f55b45a82fa1cd0ad0e5ad6ef71aa485e2934f7cdb27898d18956e03b8cc32b20e305059e1cbb83c6e9df075
-
Filesize
372B
MD55ff38615e1c143e2009cb518090401ac
SHA13e511053af10e2f74c55e28abf4ce73318559c19
SHA256ef746d9335a415bd04ea3812e47f299a6c73de2a2ecf6f303dffeaafea9bab2c
SHA5127c41c95894479f72b8b3d80218e901bfd20a667856e472cba347a71f7a51be9b898256f57e77bf42a477814bb2f1771ad35b39f808790439c8090215f6a4468c
-
Filesize
372B
MD579d3dca58fb3ac790cebe2ebaf673483
SHA1dee89622d79dd42c5455a850b2439861580d03cb
SHA256bad6b389f1e602e387f936541fb31b5a33c7497300cca64dabf6cb56c3ddd77f
SHA512a82456cec6034519bc253a32c629b97a80b63badf6e07e513999ea7df7d31889f074e198e84c967146b16211dc27f6ae20c1116422983c807439bf7611b3be1f
-
Filesize
372B
MD5d9ec73c565a698f2d2c886b99ebcad0f
SHA1ee1c3bee5b3c75bc945545ee5420396932ea66e5
SHA25686b8753bb9ba83be483e79d9f5f868684628b3bc45eeaf3974747a59cecf7688
SHA51220512d7a69750cc9f0b00d071f217371fbf18f9d501c37ca05d8b5f7280d5ffea55f0c0b13baba3b5f20a20831ac654c79a8af3429b7a8a5a13fbd2dfa08877d
-
Filesize
11KB
MD545c4e52e3f5c7eb8c2ce8a6ad099da48
SHA130dcf050bce4a314160f2d25dcb792fed20787cf
SHA2560c345ad27c571d46febde6bf320acaf85635eb6a7b748f292c0563419339a57e
SHA5128b020f2e23abed24c1760b729ddbc27db05da4781e16214016481b0e1399ae98df4e022cf8258c1c7c2550d76855183295339da85ee602a640161f1754f40a3f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e