Analysis
-
max time kernel
146s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:20
Static task
static1
Behavioral task
behavioral1
Sample
ea929a5b89100a3bf965721bff6b5292_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea929a5b89100a3bf965721bff6b5292_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea929a5b89100a3bf965721bff6b5292_JaffaCakes118.html
-
Size
69KB
-
MD5
ea929a5b89100a3bf965721bff6b5292
-
SHA1
5ed8920085dac28fde7b64aade7334ee6501fe37
-
SHA256
20cb17fbb03f146bbb37a159c94a99a9bd70f7951b80b8c16233e3697fb7e922
-
SHA512
c822f581b16cab7da5c18d49f4afc0318e09ac79c9b76abe58aaec4ceee20ad81c57979889ae449b5a6d27d4a97755670333201bae9b1d146d268035fbaf2eca
-
SSDEEP
1536:haypQpQMmS+z5iTmUg/MdoCL1iRYyS+L1bFe:oQQpQMm5Gw/MdoCL1O/S+L1bFe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 4216 msedge.exe 4216 msedge.exe 2584 identity_helper.exe 2584 identity_helper.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe 4216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4216 wrote to memory of 376 4216 msedge.exe 82 PID 4216 wrote to memory of 376 4216 msedge.exe 82 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1204 4216 msedge.exe 83 PID 4216 wrote to memory of 1880 4216 msedge.exe 84 PID 4216 wrote to memory of 1880 4216 msedge.exe 84 PID 4216 wrote to memory of 5028 4216 msedge.exe 85 PID 4216 wrote to memory of 5028 4216 msedge.exe 85 PID 4216 wrote to memory of 5028 4216 msedge.exe 85 PID 4216 wrote to memory of 5028 4216 msedge.exe 85 PID 4216 wrote to memory of 5028 4216 msedge.exe 85 PID 4216 wrote to memory of 5028 4216 msedge.exe 85 PID 4216 wrote to memory of 5028 4216 msedge.exe 85 PID 4216 wrote to memory of 5028 4216 msedge.exe 85 PID 4216 wrote to memory of 5028 4216 msedge.exe 85 PID 4216 wrote to memory of 5028 4216 msedge.exe 85 PID 4216 wrote to memory of 5028 4216 msedge.exe 85 PID 4216 wrote to memory of 5028 4216 msedge.exe 85 PID 4216 wrote to memory of 5028 4216 msedge.exe 85 PID 4216 wrote to memory of 5028 4216 msedge.exe 85 PID 4216 wrote to memory of 5028 4216 msedge.exe 85 PID 4216 wrote to memory of 5028 4216 msedge.exe 85 PID 4216 wrote to memory of 5028 4216 msedge.exe 85 PID 4216 wrote to memory of 5028 4216 msedge.exe 85 PID 4216 wrote to memory of 5028 4216 msedge.exe 85 PID 4216 wrote to memory of 5028 4216 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea929a5b89100a3bf965721bff6b5292_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdfad146f8,0x7ffdfad14708,0x7ffdfad147182⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,10729620544917626072,1557571884722472501,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,10729620544917626072,1557571884722472501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,10729620544917626072,1557571884722472501,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2492 /prefetch:82⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10729620544917626072,1557571884722472501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10729620544917626072,1557571884722472501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10729620544917626072,1557571884722472501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10729620544917626072,1557571884722472501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,10729620544917626072,1557571884722472501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,10729620544917626072,1557571884722472501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10729620544917626072,1557571884722472501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10729620544917626072,1557571884722472501,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10729620544917626072,1557571884722472501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10729620544917626072,1557571884722472501,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,10729620544917626072,1557571884722472501,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4220 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2e16721c-d10e-4337-bac7-6f64d352955f.tmp
Filesize6KB
MD58efb55b8ba53a85531d065a049c2b46d
SHA199f24abbce0867b51064fe386b8c5e0f9383da78
SHA256e785f71b3dcecdfb808c91c5fdea7be2a3fe3024fdab2100a84b87e23393a25d
SHA51215ebd3f3d37b52605c902d8793dd42b1f13a44dbc7db16634458c7f63e488e45175406b1aaf2dda7e3a39142d97c119f2715bed3ca65c52733c79cde860b61f5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5b5a16df3c1af22c49ff00c3b75008bd3
SHA17f03b569c93b1dacd4b2bb6ceca58ae428fcc6e6
SHA256e3b03135bc05bb63c78761cb9468e5f2b75bec9f84fc7e99c39f079d77bdfe7e
SHA512f7b837d280785396c025dfd9aa80ba0a2cc391f0e22227c9b57a64a96c1f1d69b8b494b6b21972ba7487d8ee202d002cdd36fddd318f92f79ffc1a0438cc21be
-
Filesize
1KB
MD568e5fbf895f8ac1f3531ac58b01dc7a0
SHA1b48145f26797385740f82f03812411186b69abad
SHA25601efa55181f10ecdff826f05b5a816e9c25045528fa648aa86445218af6e5a81
SHA512562e3b8830af5404047bea562cb4e03eb53f393728dc5c4c1ebb718a0a88086351cb3f22268069e10b01bedc3baf393cd53660eca1a69a2cba6df281f9d001a8
-
Filesize
1KB
MD560f8bc6f9853b98437a40549389e7514
SHA18ebc8c5d61ba8531a430b32a02e5888f0b790c36
SHA256589cd24aa1a7ef8bd4cc94135e78b74a7d58c604822945fc50f9a3e24430a838
SHA512ef59e5f0446d0de3d27cd594c6bfdf557e72382e27f62982bf7ab6386f4b25ecba35ab54b748cfd8376c5e34b82d5229bf3daf25b845559938ae90d1675fc8e2
-
Filesize
5KB
MD5d5163b610cb720bf7f29e249b56c4de3
SHA1f4c291ffb6f4b30ad195628353fb96eb459f8946
SHA256becc423afef63ce04b0c58e81fbfa0a351b87b55c3062d7a7c5de9970d9900ad
SHA512bfd12bc77b38edcb3f1a74ed9b2372015bda6e77aed4bd2a632663e19cdd876d19e5c32f9d93275de76a5d6865d771837c82c867ebd859a4474766e277374675
-
Filesize
7KB
MD59a20f7110b12fc3b6ea4e4522691895a
SHA193c7309d04b09a3b1079eebcbd6ba430e0d85875
SHA25673442722cdedca9a3ac159e0a2187be072744173e794b08daf2e973f08f8eddd
SHA512585354629bf962ac438e0b9accfd5dc6b309a762f1c9906f2c72c20996717b56b31378760c818cf4a0af02cad0e244018f7434d4fc7ab063b64dd487829aaca0
-
Filesize
532B
MD502f1d4992b310fb320b1a6e6d06aba08
SHA14f37285eef8b79682a28f54083d6c064e381676c
SHA2569a8c9fe8a9c94b34e667eaf73a842a2bf6606962b6afc8c8e38ee52f4b691b4b
SHA512c014c6ed93a2dbd05fbf1a8a18e2c6ae99a5d4a505441105d5f3effdbc12c5f78044f3a53fa1e9030085926aa380c2788421039ff8de0110743b32e63cba4cae
-
Filesize
367B
MD52b020e687c3100065767ba65e59454e4
SHA1ec727e7b0ff11c32327891b316be49339efe037a
SHA2565937f3fb49725d150d2a8f6029c22666aad71e6479d9626b0856c05ce22f08df
SHA5126861332846c7535a43647cd45a904b6d7a4ed9fddaf1212d4f7cd59c28e35de685f20f7301bd47c8d6889d13ddbc5e662dbfffd99a3d1460895478cecedbe93f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51f97a1a32692aa1d605944822b10749d
SHA19fedc949da460b90d7cfa710aa9cbbf9ed95828e
SHA256bc3f80cd79ba2f4c4fde6ec51dfbe42766e35e3177ca247a8327e7c266be42e8
SHA51238bd5537e17aa8e03b6839340ac86170386df27460d77513b0da3b2e1f28399afd24bbd3da0f5104482ea6b422465a3aafbde6335cf30abff48f6f4ad1358e2c