Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 06:47
Static task
static1
Behavioral task
behavioral1
Sample
5f6f13f01f9682e316e98818909a08ea_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5f6f13f01f9682e316e98818909a08ea_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5f6f13f01f9682e316e98818909a08ea_JaffaCakes118.html
-
Size
124KB
-
MD5
5f6f13f01f9682e316e98818909a08ea
-
SHA1
041e4baf602ecb1461ed4cac877ba13a467c5bd9
-
SHA256
8faa6c185b7aff1bedc33f0a031309e25a6ae25560a91aff8df48a53c95f30a1
-
SHA512
3e88ff7aae37338a43997c754b0ac77d031c53368339a980b4fb5cb58e79d44e97fedecc6b4f8beba2c74800985c25a6a212e86e4ccef63d9bc521ddbc779d9c
-
SSDEEP
3072:pUICWDxYxQ2PDxYxC2T/Z1s0oEZNC8SefhENE/jzCqezqm3DO:pUI1DxYxQ2PDxYxC2T/ZiOv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1108 msedge.exe 1108 msedge.exe 892 msedge.exe 892 msedge.exe 432 identity_helper.exe 432 identity_helper.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 892 wrote to memory of 2768 892 msedge.exe 84 PID 892 wrote to memory of 2768 892 msedge.exe 84 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 2608 892 msedge.exe 85 PID 892 wrote to memory of 1108 892 msedge.exe 86 PID 892 wrote to memory of 1108 892 msedge.exe 86 PID 892 wrote to memory of 468 892 msedge.exe 87 PID 892 wrote to memory of 468 892 msedge.exe 87 PID 892 wrote to memory of 468 892 msedge.exe 87 PID 892 wrote to memory of 468 892 msedge.exe 87 PID 892 wrote to memory of 468 892 msedge.exe 87 PID 892 wrote to memory of 468 892 msedge.exe 87 PID 892 wrote to memory of 468 892 msedge.exe 87 PID 892 wrote to memory of 468 892 msedge.exe 87 PID 892 wrote to memory of 468 892 msedge.exe 87 PID 892 wrote to memory of 468 892 msedge.exe 87 PID 892 wrote to memory of 468 892 msedge.exe 87 PID 892 wrote to memory of 468 892 msedge.exe 87 PID 892 wrote to memory of 468 892 msedge.exe 87 PID 892 wrote to memory of 468 892 msedge.exe 87 PID 892 wrote to memory of 468 892 msedge.exe 87 PID 892 wrote to memory of 468 892 msedge.exe 87 PID 892 wrote to memory of 468 892 msedge.exe 87 PID 892 wrote to memory of 468 892 msedge.exe 87 PID 892 wrote to memory of 468 892 msedge.exe 87 PID 892 wrote to memory of 468 892 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5f6f13f01f9682e316e98818909a08ea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5d4a46f8,0x7ffe5d4a4708,0x7ffe5d4a47182⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,7595653936695739108,7153266828471566286,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,7595653936695739108,7153266828471566286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2540 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,7595653936695739108,7153266828471566286,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,7595653936695739108,7153266828471566286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,7595653936695739108,7153266828471566286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,7595653936695739108,7153266828471566286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,7595653936695739108,7153266828471566286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3692 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,7595653936695739108,7153266828471566286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,7595653936695739108,7153266828471566286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,7595653936695739108,7153266828471566286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5992 /prefetch:82⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,7595653936695739108,7153266828471566286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5992 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,7595653936695739108,7153266828471566286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,7595653936695739108,7153266828471566286,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,7595653936695739108,7153266828471566286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,7595653936695739108,7153266828471566286,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,7595653936695739108,7153266828471566286,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5e723172952b407a627ddaa3e206cc898
SHA16aab3d4fd5720c2170fb52337f4d600825124449
SHA2563828273d785265f3914308582a9f199bb0ce1b1fa29b9a28e4ec22a7b541fc6c
SHA5127d2fdfe7c06af72e579ff5141ef84f81724186af2d67ee1138c44bc887a0c60b099afe687b7fab83f0ccd32cd7fb6be7d7686677de7c4b7fef4b99001762bd7e
-
Filesize
1KB
MD57cb828f03d7f98035c61657e5f43a903
SHA1cf1c29758a7f23137c05da92c0d6e726060e15c7
SHA25692e3a7bdec58634b046a751e3915516b4638e08b6e3bca4ea0786fbbce45eed4
SHA5120fbbbf6606c8bbba3df0cbee627b39149745ccde59212d100a7c439452e64fd8de497aad7a22571a505dd7cc185657124a300048bb93d7794121d830153335b0
-
Filesize
7KB
MD58db16501927ef378987f2b9f4117478b
SHA1746b1bd941828d0466d062c602744bcb086e572f
SHA2560b8805c28795a350eb445dea2d1fd89ac3f252b84acb105ac6371f5cddecfbd3
SHA512024d727819e42f041c244beeb38fed3ced599f347fcbeb65626917e517cdab532683201892175d31f390d23dcab9b85168b698230a9b9c0af6dc273125da06c5
-
Filesize
5KB
MD54c0cb08d437b1e7290f0e86eecd745fd
SHA11d42f724dc22be572811a643c33167441f284b82
SHA25689a6c2ef20d794dd2c3a936d7ffcecd10fb6826b2a4111a9abb8b4f8d274f8a2
SHA5128412fcc9566cfbdcefcfd6cce69265e80c31e2b93e19ad66e810a26e53d628c3d91a0a32aa3150baa91c156c03ed56c6e82cddff357de2b465165cd6b3d1d7bc
-
Filesize
7KB
MD5822c3a6324d1cc4e0953bca421319770
SHA12a8e3b9c4f83059a42637065657eeda9d3613f6c
SHA256a8dece4a11ad67bfeff695703c2d21a2d9cd84bc6116162096aa2cda821dfd21
SHA512b132d3e2d1a52cee1bce4928621931d91022acddd670e7b435250c9166020c442029a2c2d57dc610112d7c34e12e53652e17d7631058a53cc242cf8ac38c8962
-
Filesize
203B
MD5bc6a5660d005762d664527496733d62a
SHA1df235a6f1023ac1b11571238fbd6161e4c839521
SHA256fbc9ab775a0727399c7a93a257e9f60947ed38ffd4e030c784e4a60726c6fc23
SHA5120c05dcf70b022acff3608e749df0d45411bffc4eb146cb8c5da6274b1a6480c88cc06d64ef07b24efb5add62063b35814d749175ce08712a71a8c9c34a5446c0
-
Filesize
201B
MD55c89a92ab538001400988ab080fe864c
SHA123d24a01a0c2c1910dc70b7cabe1e7368b15044c
SHA256653f2141e71ad21647d73770c5b0b8502a3a88d51d6162e43e2dafcdb24b0c75
SHA51257f61d64068ff9e97cf988dbdbb8f3a0e75efb0f2eb87682d4f57cb0cc89c25bd24f3953c4aa8c3b6dba76a9d5f63fe8ee0170f7d4ed26d023e14b37909930bf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51e49d23b454ad3301c8fe7bd12bd9dba
SHA197d2824f369a1f7f41d89d4cb68cc2b8f42ed5cf
SHA256c98868f6508da46f0ae73776f6ce0bab681b5651e65636d6033fd20743f9dd0b
SHA512eeaa56e9d35deaa40c51f3e914e3453985587f2a3edf1b893c124c9a1dc2c6a1f2782ef4664539c8cc6f2707c7e30c15a111358265f48f2b02e7a9fb08258fc0