Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
2e593b7fab5388b36d4c07ea2a8ad4a5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2e593b7fab5388b36d4c07ea2a8ad4a5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2e593b7fab5388b36d4c07ea2a8ad4a5_JaffaCakes118.html
-
Size
142KB
-
MD5
2e593b7fab5388b36d4c07ea2a8ad4a5
-
SHA1
ea7f1fd65ddde26cc833ce48479b9f11df91d6e9
-
SHA256
73cb803e87b8d86b647a905726dd2a4c75e16a55238ab5f86045e40685279079
-
SHA512
110ddfb807a9e94a4109142072a40fc4ebd700b2d63ff1ba773ccb4961d3b069a59aca77d7d17540025b96fdcf7dfb6c860cdd63db9bd0ee054b82e6c34e4332
-
SSDEEP
3072:Ny9PTpnFZR0T8L0l22c2qGCH1hUzGwtILxmUqNbrZSi:Ny9PT5rO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 380 msedge.exe 380 msedge.exe 4568 msedge.exe 4568 msedge.exe 3320 identity_helper.exe 3320 identity_helper.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4568 wrote to memory of 3088 4568 msedge.exe 82 PID 4568 wrote to memory of 3088 4568 msedge.exe 82 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 2616 4568 msedge.exe 83 PID 4568 wrote to memory of 380 4568 msedge.exe 84 PID 4568 wrote to memory of 380 4568 msedge.exe 84 PID 4568 wrote to memory of 4788 4568 msedge.exe 85 PID 4568 wrote to memory of 4788 4568 msedge.exe 85 PID 4568 wrote to memory of 4788 4568 msedge.exe 85 PID 4568 wrote to memory of 4788 4568 msedge.exe 85 PID 4568 wrote to memory of 4788 4568 msedge.exe 85 PID 4568 wrote to memory of 4788 4568 msedge.exe 85 PID 4568 wrote to memory of 4788 4568 msedge.exe 85 PID 4568 wrote to memory of 4788 4568 msedge.exe 85 PID 4568 wrote to memory of 4788 4568 msedge.exe 85 PID 4568 wrote to memory of 4788 4568 msedge.exe 85 PID 4568 wrote to memory of 4788 4568 msedge.exe 85 PID 4568 wrote to memory of 4788 4568 msedge.exe 85 PID 4568 wrote to memory of 4788 4568 msedge.exe 85 PID 4568 wrote to memory of 4788 4568 msedge.exe 85 PID 4568 wrote to memory of 4788 4568 msedge.exe 85 PID 4568 wrote to memory of 4788 4568 msedge.exe 85 PID 4568 wrote to memory of 4788 4568 msedge.exe 85 PID 4568 wrote to memory of 4788 4568 msedge.exe 85 PID 4568 wrote to memory of 4788 4568 msedge.exe 85 PID 4568 wrote to memory of 4788 4568 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2e593b7fab5388b36d4c07ea2a8ad4a5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb44b146f8,0x7ffb44b14708,0x7ffb44b147182⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,11461127293191373063,13554843364668400049,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,11461127293191373063,13554843364668400049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,11461127293191373063,13554843364668400049,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11461127293191373063,13554843364668400049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11461127293191373063,13554843364668400049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11461127293191373063,13554843364668400049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11461127293191373063,13554843364668400049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11461127293191373063,13554843364668400049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11461127293191373063,13554843364668400049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11461127293191373063,13554843364668400049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3584 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,11461127293191373063,13554843364668400049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3464 /prefetch:82⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,11461127293191373063,13554843364668400049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11461127293191373063,13554843364668400049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3884 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11461127293191373063,13554843364668400049,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11461127293191373063,13554843364668400049,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11461127293191373063,13554843364668400049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,11461127293191373063,13554843364668400049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,11461127293191373063,13554843364668400049,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5168 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
851B
MD5c5b2b4b7bca3d4c293b6bf0168609f6f
SHA1726540ba1be8f49c6aafbbfa2caf97469b4bc47a
SHA2562f95895060a1bfc80032d609b310b2f16aa9901665f6f1369b3165154c8a347a
SHA51285edab180dfc54fd139b48e0e653787c60d948edcc6409052ece02b615a0778372a6bc611ff8ea31db0dd37b8411e884abbbf81cc9e8d8efa8b721cabbbb3769
-
Filesize
5KB
MD51b32fc174bbbd74d7dc5523cd5195f0e
SHA13c9a1d8f60d9abe2d7ba81af2098593fd1b39078
SHA256aaa417995bca4746560a31af97efb3be40c344d801d6ff28cc4d5cd172ec9c07
SHA5126509fb13d531d495ba5e34c51732df0552c62d3c8909d0726824f8357999f18328f07a9bbee5c5e098bdae8c1624993c22b31a9b22e0c09b8097317e19d96af2
-
Filesize
6KB
MD5ac3ec23badb063542532da663ff899a8
SHA14cf2b6908f6b4712d2a8b93089cbe5298e09fd26
SHA256ebfe58f78db565e0b1ea31ce608646a958f425d44ebbb50757e85399b6a9cae4
SHA512bde673737a1e091d727b4e25b2db58f3dcef0b3d03041362a5f380be4c8bcd423db9f6110c6b3a331b0cd8bac0efdf6afce7f154fcd2b8c5bcd2b94978e18df6
-
Filesize
6KB
MD57afb4a80efa59847dee7757c5b499fe2
SHA1f0cdf80838324c5e8172c04c0d85c9fabd8d0002
SHA25664e8098aa296dfd7e288d1cc44a3ab45774c607b57b202eff061d6cc2d5c735e
SHA51285db43bcb6b0c77094681aede5fbbeae8865df60d4bd67b83fc4ef59ddf0d51d65cd4dc5b600bf14e291d6e5558ab7f37828b0367e26ffb3e635f14d9573fbdf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD564538540b80378085dabf21c923439d4
SHA144e85bb6963e157b78045f04a6b79363a4349b5d
SHA256ee951ad7ef143363e4eb07e44dcd0f849e20b525df2fca2dd631dc584c8af56f
SHA5129456109a5e300639989374f1530f42ad1037429098e524988b2ccf0073409895f114a556c1d0a388d23ff27e619831b6750ed4b110731aed592cc0fa0dabfcde