Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
3a7c93de5cfa9a8f04ddba26ad33b395_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3a7c93de5cfa9a8f04ddba26ad33b395_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3a7c93de5cfa9a8f04ddba26ad33b395_JaffaCakes118.html
-
Size
57KB
-
MD5
3a7c93de5cfa9a8f04ddba26ad33b395
-
SHA1
10419d5bb2cd6bd7b3eb7159436bbc02a934a799
-
SHA256
6c38f0925658f155f4c6c308e1497c8e63b7f21bbc6b2e677a9c7f013ecd395a
-
SHA512
89f4c8e8f1c38938fa117d46b2b0a3004a39967712e5b066b6d88f0b8362a46705f2767cde3732561edf7d3372bbd87c7246eebf624abf1f455efa27ab60483b
-
SSDEEP
1536:gQZBCCOdh0IxCN1/b9fifEfzfefMf3f7fffOfPfLf4fUfaxfofHfgfcfPfufNfeI:gk2z0IxO6cLm0vjn2XzQcCxg/4U321WI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1944 msedge.exe 1944 msedge.exe 1804 msedge.exe 1804 msedge.exe 3804 identity_helper.exe 3804 identity_helper.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1804 wrote to memory of 4948 1804 msedge.exe 83 PID 1804 wrote to memory of 4948 1804 msedge.exe 83 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 2776 1804 msedge.exe 84 PID 1804 wrote to memory of 1944 1804 msedge.exe 85 PID 1804 wrote to memory of 1944 1804 msedge.exe 85 PID 1804 wrote to memory of 528 1804 msedge.exe 86 PID 1804 wrote to memory of 528 1804 msedge.exe 86 PID 1804 wrote to memory of 528 1804 msedge.exe 86 PID 1804 wrote to memory of 528 1804 msedge.exe 86 PID 1804 wrote to memory of 528 1804 msedge.exe 86 PID 1804 wrote to memory of 528 1804 msedge.exe 86 PID 1804 wrote to memory of 528 1804 msedge.exe 86 PID 1804 wrote to memory of 528 1804 msedge.exe 86 PID 1804 wrote to memory of 528 1804 msedge.exe 86 PID 1804 wrote to memory of 528 1804 msedge.exe 86 PID 1804 wrote to memory of 528 1804 msedge.exe 86 PID 1804 wrote to memory of 528 1804 msedge.exe 86 PID 1804 wrote to memory of 528 1804 msedge.exe 86 PID 1804 wrote to memory of 528 1804 msedge.exe 86 PID 1804 wrote to memory of 528 1804 msedge.exe 86 PID 1804 wrote to memory of 528 1804 msedge.exe 86 PID 1804 wrote to memory of 528 1804 msedge.exe 86 PID 1804 wrote to memory of 528 1804 msedge.exe 86 PID 1804 wrote to memory of 528 1804 msedge.exe 86 PID 1804 wrote to memory of 528 1804 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3a7c93de5cfa9a8f04ddba26ad33b395_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5e5b46f8,0x7ffd5e5b4708,0x7ffd5e5b47182⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,12805273364440458022,14116845950658577093,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,12805273364440458022,14116845950658577093,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,12805273364440458022,14116845950658577093,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12805273364440458022,14116845950658577093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12805273364440458022,14116845950658577093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12805273364440458022,14116845950658577093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12805273364440458022,14116845950658577093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4492 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12805273364440458022,14116845950658577093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,12805273364440458022,14116845950658577093,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6260 /prefetch:82⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,12805273364440458022,14116845950658577093,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12805273364440458022,14116845950658577093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12805273364440458022,14116845950658577093,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12805273364440458022,14116845950658577093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12805273364440458022,14116845950658577093,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,12805273364440458022,14116845950658577093,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3180 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
215KB
MD51585c4c0ffdb55b2a4fdc0b0f5c317be
SHA1aac0e0f12332063c75c690458b2cfe5acb800d0a
SHA25618a1cfc3b339903a71e6a68791cde83fca626a4c1a22be5cb7755c9f2343e2a5
SHA5127021ed87f0c97edc3a8ff838202fa444841eafcbfa4e00e722b723393a1ac679279aa744e8edde237a05be6060527a0c7e64a36148bd2d1316d5589d78d08e23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD55e7798bd85a9418106e278889f75f409
SHA161be2c9f880c4d51142c9353c837f96f62438553
SHA256010f4acf6f1c7df237a917f912872fc227776064674d7a9b64f642808f425533
SHA512c2f8467c9be60e93d8b9af89a69944bd023c95ce2730a679e68f970acee5d2bb5b9da1f1f688f2f1c1d6a6f349dac38ca198754a2713165dcd9b5291ea73fffc
-
Filesize
1KB
MD5a7290c867a2a88217a9c5bd80026796d
SHA11805d8f189b26f1f99251df5111ccee24ff3afa1
SHA256f21a3ed6b4e27aabe89b30279153128e9b08ebcaa83418b217973446c1b9e2b8
SHA512ec111a387026fedafc5069096e2dc41a8b4aaf52ee8524c3cfa40b836e151e753dd4fed0fce5a0a96e8e7fb591991607d534fd2634aa547c60c87b33abad02ab
-
Filesize
6KB
MD54d1fcc76d439d767bb235fbd417f7ef8
SHA1bc1cf7c5e0f5fd51fe5a8c223044821de5606daf
SHA256e0f5aefbe65fa64b10d5b567a2997ea66d737a11e09eb05f43d6fd3586a2db5f
SHA512995a8929bc567de7c7d7c544f45d3af334b8b4c9ca59a41de8ecffe65b8d21b4b8c587161c190d24f8f054f2dadeb8af16960732a6eaaf929e50129001060dd1
-
Filesize
6KB
MD585cff47475e031529b406c79e613662e
SHA1235bba5bd3a20112c62541e6aabcc523b621c659
SHA256cae27d459686f261beb621d8f627cd734a0987e616082823c972c674738b6660
SHA512fe7f998659d4e2cfc48a610c0f9c88624fd45b62b8bfb0425f1d7cb25d804ca0d13e664ae8f8d6d82f66766159151ed60c7ba0f300d8b90457af414881def076
-
Filesize
702B
MD56b5f3d43a3cba2a8e054f244de64fb49
SHA1356cd783b6b7b44a066c7bcd7d7584fc1dac3afe
SHA256eae3e9eb124b03449993546a4320e11ef4f479aa2a6ba222c196d091df01eb57
SHA512745834dbde8a79230cbd17c7e9d173f8ac6de26e41b6d16b86376145e980163809c595752fd5ac0526d03658d54efefc85110cb15872fc3ed650297f721beab4
-
Filesize
370B
MD536e1e5c8d44cd63f3d62d6c3e4038f98
SHA1d11613a5bf2c7157ddce117a59d0f4de5846d549
SHA256929a31631d90b596c2f3db95632062c01012964c5288928f44552eac05798410
SHA51288acff31c3f6f1213f2313899812e0712e625fca8adec6c4f51bfd745342d36277e1f2a63c932a27572f823b164c18894177bbf697bcd61831b59ed6c710d3a2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD548904d060363ba8c049a32610933424e
SHA17e096587d99d58b3c41d4a8860abb53aa4264750
SHA256fdf13f920fc050c8d85c7bb399533e4f3b083d1a639ff40e7ed97bfa6ba12f2e
SHA51297ed635cf8bd15a7a47911cd7ab08c5c7b1ef819857003bab9c331c010a613ec02e4da2769d3fbb05bb292cdef914ed92885709a9a1851efa52a072165a275ea