Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 17:42
Static task
static1
Behavioral task
behavioral1
Sample
35c74493e92a9a830c7f6e8628e7accd_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
35c74493e92a9a830c7f6e8628e7accd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
35c74493e92a9a830c7f6e8628e7accd_JaffaCakes118.html
-
Size
44KB
-
MD5
35c74493e92a9a830c7f6e8628e7accd
-
SHA1
bbf522138edd01bd17b2036daa74c783fb895ace
-
SHA256
d35a6330dcbe72063f9465cc79a0a0eafc37bfb70911a56af00681c42eecb63d
-
SHA512
fe5b5a0264456c1bf1c60074488a3f9895a9fa8619488301139cde6f80072fe224eca29b8a4485a677f7ba0a4bee8531ffc644701e74755a3f6eef7fa75497f9
-
SSDEEP
384:KzsHmdqaPtJJ7iEHeUHErR6q1OC9CKfPoBfL1MFbxul+/fw0z105K8sprxdZi5uQ:6JJJ7sUH81j9CK3bxfnwhuZ2bmQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4232 msedge.exe 4232 msedge.exe 4308 msedge.exe 4308 msedge.exe 4368 identity_helper.exe 4368 identity_helper.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4308 wrote to memory of 4264 4308 msedge.exe 82 PID 4308 wrote to memory of 4264 4308 msedge.exe 82 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 5084 4308 msedge.exe 83 PID 4308 wrote to memory of 4232 4308 msedge.exe 84 PID 4308 wrote to memory of 4232 4308 msedge.exe 84 PID 4308 wrote to memory of 2884 4308 msedge.exe 85 PID 4308 wrote to memory of 2884 4308 msedge.exe 85 PID 4308 wrote to memory of 2884 4308 msedge.exe 85 PID 4308 wrote to memory of 2884 4308 msedge.exe 85 PID 4308 wrote to memory of 2884 4308 msedge.exe 85 PID 4308 wrote to memory of 2884 4308 msedge.exe 85 PID 4308 wrote to memory of 2884 4308 msedge.exe 85 PID 4308 wrote to memory of 2884 4308 msedge.exe 85 PID 4308 wrote to memory of 2884 4308 msedge.exe 85 PID 4308 wrote to memory of 2884 4308 msedge.exe 85 PID 4308 wrote to memory of 2884 4308 msedge.exe 85 PID 4308 wrote to memory of 2884 4308 msedge.exe 85 PID 4308 wrote to memory of 2884 4308 msedge.exe 85 PID 4308 wrote to memory of 2884 4308 msedge.exe 85 PID 4308 wrote to memory of 2884 4308 msedge.exe 85 PID 4308 wrote to memory of 2884 4308 msedge.exe 85 PID 4308 wrote to memory of 2884 4308 msedge.exe 85 PID 4308 wrote to memory of 2884 4308 msedge.exe 85 PID 4308 wrote to memory of 2884 4308 msedge.exe 85 PID 4308 wrote to memory of 2884 4308 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\35c74493e92a9a830c7f6e8628e7accd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a8ac46f8,0x7ff9a8ac4708,0x7ff9a8ac47182⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9313765790575705335,1624366538413459420,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,9313765790575705335,1624366538413459420,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,9313765790575705335,1624366538413459420,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9313765790575705335,1624366538413459420,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9313765790575705335,1624366538413459420,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9313765790575705335,1624366538413459420,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9313765790575705335,1624366538413459420,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9313765790575705335,1624366538413459420,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1768 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,9313765790575705335,1624366538413459420,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:82⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,9313765790575705335,1624366538413459420,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9313765790575705335,1624366538413459420,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9313765790575705335,1624366538413459420,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9313765790575705335,1624366538413459420,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9313765790575705335,1624366538413459420,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9313765790575705335,1624366538413459420,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3164 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3880
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5d662dffb548ba25b24444694198b934e
SHA1902da6de515d1be6152afa890f71f985553962fc
SHA256159ae644b76630d38fbfbb655d92a7904338119427e567c07825e9d501903f18
SHA512b13c76b884ebaa0a86a72a9b63299560a437215fef393b7906c03bea8e3de76008205edbf70bc8693de91245b189af1740fbfc61e3147a0415122378109f9134
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5158df185409ca290c7a0ed50359f950c
SHA17d230aeff7c6644737c2356a92fb9ce97c0f2fba
SHA256283be2cb5f5beb9fbc27e978c9affbc4bee6119775109082a96d22f9d351e17a
SHA512cc136ca07cdf642a890fba523a94076f1bc31f1717c7afbaf96f29696c7e6502958e4324debc0d52a9380916a3e82a0afa756f9cbe524b439aed5b0697af737b
-
Filesize
2KB
MD5e72a2e5c42346acdea0f3a115f6b5438
SHA1d21136cda5dc44c7da3a3e03403ec89cf391c0d2
SHA256cea83256458688cfaf7885abb5551d0546ef59a80a7a4e85eee4a99467650a2e
SHA51203ae020510bf92cc88bb3f77bf617dff60b193bc99a506198d3fe69ec1a7920f3cabfaf6070735985ea76cac5080fd02d88bb90eeecf7c239c9c82c423f93e16
-
Filesize
6KB
MD568e457c6c5109eb20d355c927e8094be
SHA1d9231c57f219560ae339d0adaefed9bacee4b6e9
SHA25616d836fb487a4fe18182fd9cb9bca07e6e3dd3597e5f7db21e5981d550335ab8
SHA512cfa1e8d87cbf89ccb3138a33152d474a416370984e3ef516b597395c942902ea225f877f83508f8f4dbae1c928e0a31ad68afece04ca8b19f4c7a9a1ecbbfb5e
-
Filesize
8KB
MD52a80d99ad4475984ff6cf7092042f630
SHA12a60fbbbcf273ad9ee63de880c9108063c73ba79
SHA2562e4b1d2c779d92b89bec9ada22314fbccfe16f637ed689b449a15cf80fb044b8
SHA51290e02164ad1f806539fe8bd8149b3f4c2692f23aed0b6a365900e92c3dd651cec659203888c9336fc74da2ba481ec25783a1df710aed97014df8db93f39f481f
-
Filesize
7KB
MD548048d346d3d3a741358ec7b18a0ec8a
SHA17ee15739863fcc7bf198ef775961be5235903b79
SHA2565465516edd4e4cf0870313b04733cb88af41ea4c56feec590dd0d00156e178e0
SHA51272c3e6e08eaca6ee079a9ddced7cdb886eff071130751d17057567eda5efa1884204af963193f436db8ac39cd42de87e8fdbf69c6475524ddbb2b610f8612de3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5dcebfa23c245565f92b492366e29728f
SHA1eb97564a6d9eb2f62edd30fdf7199caf81a1b8cf
SHA2569a90c2622c53085d1f80517b782a1b658045eda6b267e81db4c4c9673792baea
SHA512a0adec8531a3cf9cda4312d7e725af31cfb0e490ac4d9ab396c683194f6e253265706f1c3b0ab2511ebbfbb408dc933e8f36946a6528aa50d857618a02fc3101