Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
f0dd457c3ceb5e04f6926b26368a0dfb_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f0dd457c3ceb5e04f6926b26368a0dfb_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f0dd457c3ceb5e04f6926b26368a0dfb_JaffaCakes118.html
-
Size
432B
-
MD5
f0dd457c3ceb5e04f6926b26368a0dfb
-
SHA1
b90fd4bdbaa9de6c6138490c2afece73fdc6a7d4
-
SHA256
c46713f26862d3c30048388fc9f40a10da32db56b49f2681fd3b15175bcb08f4
-
SHA512
5a99460cfe2c98af60f9658e0951a1e4932734f1b432ea638bb1ce152da8ebe605f8ccef7aac6db49ee61b53b0f6448821d5efc9260afe960b52af6ce84f82c8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2820 msedge.exe 2820 msedge.exe 2144 msedge.exe 2144 msedge.exe 3280 identity_helper.exe 3280 identity_helper.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 4688 2144 msedge.exe 85 PID 2144 wrote to memory of 4688 2144 msedge.exe 85 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 1128 2144 msedge.exe 86 PID 2144 wrote to memory of 2820 2144 msedge.exe 87 PID 2144 wrote to memory of 2820 2144 msedge.exe 87 PID 2144 wrote to memory of 4576 2144 msedge.exe 88 PID 2144 wrote to memory of 4576 2144 msedge.exe 88 PID 2144 wrote to memory of 4576 2144 msedge.exe 88 PID 2144 wrote to memory of 4576 2144 msedge.exe 88 PID 2144 wrote to memory of 4576 2144 msedge.exe 88 PID 2144 wrote to memory of 4576 2144 msedge.exe 88 PID 2144 wrote to memory of 4576 2144 msedge.exe 88 PID 2144 wrote to memory of 4576 2144 msedge.exe 88 PID 2144 wrote to memory of 4576 2144 msedge.exe 88 PID 2144 wrote to memory of 4576 2144 msedge.exe 88 PID 2144 wrote to memory of 4576 2144 msedge.exe 88 PID 2144 wrote to memory of 4576 2144 msedge.exe 88 PID 2144 wrote to memory of 4576 2144 msedge.exe 88 PID 2144 wrote to memory of 4576 2144 msedge.exe 88 PID 2144 wrote to memory of 4576 2144 msedge.exe 88 PID 2144 wrote to memory of 4576 2144 msedge.exe 88 PID 2144 wrote to memory of 4576 2144 msedge.exe 88 PID 2144 wrote to memory of 4576 2144 msedge.exe 88 PID 2144 wrote to memory of 4576 2144 msedge.exe 88 PID 2144 wrote to memory of 4576 2144 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f0dd457c3ceb5e04f6926b26368a0dfb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb9e746f8,0x7fffb9e74708,0x7fffb9e747182⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,7747286935894138158,3458190319200317985,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,7747286935894138158,3458190319200317985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,7747286935894138158,3458190319200317985,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7747286935894138158,3458190319200317985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7747286935894138158,3458190319200317985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7747286935894138158,3458190319200317985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7747286935894138158,3458190319200317985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7747286935894138158,3458190319200317985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,7747286935894138158,3458190319200317985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4200 /prefetch:82⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,7747286935894138158,3458190319200317985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7747286935894138158,3458190319200317985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7747286935894138158,3458190319200317985,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7747286935894138158,3458190319200317985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7747286935894138158,3458190319200317985,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7747286935894138158,3458190319200317985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,7747286935894138158,3458190319200317985,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3164 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
Filesize
360B
MD56e1943f5a783b2412c667b828592af5c
SHA1983becf61c44577a68cbc6f75993f411a46884d7
SHA256934af73b3ef7ca400e625fbd37cdbe89439c25a5fd7349c206a82b99f3d61969
SHA512e397286603cce28ee158163246d9a788ba47c4fe340e5825f9b4b0fd7154f77663f6235bbe5e8adf18a4e1a576260186b4e29b4223c6a7f82e801fbc74351175
-
Filesize
7KB
MD5e30ce697a2ce6c6ef20beeea27888cdc
SHA11f33883099d749c867ca06e0d239480664092f62
SHA25672277fd577af294f51acaf23077bbd3c5b4a47f40c01e418684eb20b505e9ca3
SHA512f862c4d09d71339deb6f250011de4f516bb6165acaf6d0925e1cdca73f3df76203678420539e7623a45423440c1d1334620ae1a98cfbcedf95636b25bd9fb2c9
-
Filesize
6KB
MD5e76ded461d40096b9e40d05f32e56041
SHA1fc1c28b750b90e721eb94c5b04ce6b6ffc3ac176
SHA256cd4db91252da15e468035154dd0cd7c67121fb483b59f3a01784a3ae103de01b
SHA512365dbca18b9869c3dc828a1a186ef1bb2013f8b24265332f4a930be33a5ae3c3b7f1d522feaab57a97a7ce89d8aa99df6b982cd3bf7c891b3010372817fefa5f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD59e57a1ad1a7d0b87e5d49d20dec1291d
SHA190e513b2aef809b3a4bee90eb41e6123054d2a37
SHA256015d67b273e7ad12a95cdfe783532a3acdd2b00bdfe5934e226110b0439320df
SHA51299553a1063c286a41a3d8b56601d39e2bc1e5e83a5345c220b8c89499bca8834999121a45ab9e0d8f288351c223d38ccd5b0267ba5dacc2039eb80600574d4a7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5784b1.TMP
Filesize48B
MD57dbc5411506c6374dc00193fa8f912fb
SHA1b2905953e2306da91b4172ec906b3202c3cecb40
SHA256fc3a3ce9fa92b2a28005dc6402967c66f62a6475f0eb77c03b66985fbc29c35b
SHA5120dfa04d5d881f612d0a74ab21a48fa566e9e97b063d1cee93e0b87854e26b6d01354a3d3143be3539a3dd707ea052ed813a231204a894261845db8df308e663f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53083e0a9b08e6daf78b8e49649e6fdad
SHA17298c4e050720fba3dd62ff48911756ed49c4735
SHA256d4a6841e413186caa07774155a21ae42d0cc0a50b8d5085dbdc619570898a6d4
SHA512fdd1ee57ff6fa66d3d07ef9a800641ba5cb42506f12bc759a4d92070a1a4d60b72e5a58eaa485dc491802b7117c7da678af5b640c76018f4bb9b0c444a59dc41
-
Filesize
11KB
MD5e96d8487d7da2361c7b6612918028ca2
SHA1602af1acf4b144e0c0056eb61890a333516c07e6
SHA256780cc5cf2a33e245a56cde6d16843d10cde472c22e6cb456b7e86aca3b0fd9c1
SHA51258124ae85dd2841b272a38bfbd3620b7ff4721a0b83e8733edf76c79bb1ade87cc877e891486cfd0058a1622063a462b52e9ba88bc8bf73ddae50240cc0f3c89