Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
3b9b7e2d277c113df908940e09370cfb_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3b9b7e2d277c113df908940e09370cfb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3b9b7e2d277c113df908940e09370cfb_JaffaCakes118.html
-
Size
1.0MB
-
MD5
3b9b7e2d277c113df908940e09370cfb
-
SHA1
98fd579aeee055f294c28b7c6d0623d4d8061b46
-
SHA256
5b1052df0061976b6cb6bd4d5c663ef55b80c07a4f1bb0cc301ab64f417b8e66
-
SHA512
45df1c574e7a938d6a234fd8f4ea18f112a952a3836042936e35cca09a32f3702b48dbe711136f321248b5580532bfe744069db25b3f3c78e19b1c5d1b37ad9a
-
SSDEEP
6144:Ekcli64UQ6Y/JBDRl3LHhFKB/SKbO6/lsE2HG1qxt+GPaqFZV+rW1bW1:EkclipB66BDRl3LqBZ7xq/1U
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2372 msedge.exe 2372 msedge.exe 4772 msedge.exe 4772 msedge.exe 4568 identity_helper.exe 4568 identity_helper.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4772 wrote to memory of 2916 4772 msedge.exe 82 PID 4772 wrote to memory of 2916 4772 msedge.exe 82 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 5952 4772 msedge.exe 83 PID 4772 wrote to memory of 2372 4772 msedge.exe 84 PID 4772 wrote to memory of 2372 4772 msedge.exe 84 PID 4772 wrote to memory of 2948 4772 msedge.exe 85 PID 4772 wrote to memory of 2948 4772 msedge.exe 85 PID 4772 wrote to memory of 2948 4772 msedge.exe 85 PID 4772 wrote to memory of 2948 4772 msedge.exe 85 PID 4772 wrote to memory of 2948 4772 msedge.exe 85 PID 4772 wrote to memory of 2948 4772 msedge.exe 85 PID 4772 wrote to memory of 2948 4772 msedge.exe 85 PID 4772 wrote to memory of 2948 4772 msedge.exe 85 PID 4772 wrote to memory of 2948 4772 msedge.exe 85 PID 4772 wrote to memory of 2948 4772 msedge.exe 85 PID 4772 wrote to memory of 2948 4772 msedge.exe 85 PID 4772 wrote to memory of 2948 4772 msedge.exe 85 PID 4772 wrote to memory of 2948 4772 msedge.exe 85 PID 4772 wrote to memory of 2948 4772 msedge.exe 85 PID 4772 wrote to memory of 2948 4772 msedge.exe 85 PID 4772 wrote to memory of 2948 4772 msedge.exe 85 PID 4772 wrote to memory of 2948 4772 msedge.exe 85 PID 4772 wrote to memory of 2948 4772 msedge.exe 85 PID 4772 wrote to memory of 2948 4772 msedge.exe 85 PID 4772 wrote to memory of 2948 4772 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3b9b7e2d277c113df908940e09370cfb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1ec946f8,0x7ffa1ec94708,0x7ffa1ec947182⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,3043776147793044722,6588226719883046780,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:5952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,3043776147793044722,6588226719883046780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,3043776147793044722,6588226719883046780,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3043776147793044722,6588226719883046780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3043776147793044722,6588226719883046780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3043776147793044722,6588226719883046780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3043776147793044722,6588226719883046780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3043776147793044722,6588226719883046780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3043776147793044722,6588226719883046780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3043776147793044722,6588226719883046780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,3043776147793044722,6588226719883046780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3500 /prefetch:82⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,3043776147793044722,6588226719883046780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3043776147793044722,6588226719883046780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3043776147793044722,6588226719883046780,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:5508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3043776147793044722,6588226719883046780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3043776147793044722,6588226719883046780,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,3043776147793044722,6588226719883046780,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4152 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5567613b4a6b6b6cb39f92683b077f10b
SHA1a335e5fcaf1455e50be85d1148fc1da8fe7584b7
SHA256be940847b7dc633ef6e5404b6de838365d1e3ee630544f28d614f3fbc29a2a82
SHA5127ec6e8cc37db5ed78c0a4e30d306b850c71da82b8813d2effc4dde92b9957c42611f56ff1c68dac65f6bd9448c138fc83963646c7efa3583df31f21fcef2a713
-
Filesize
2KB
MD5480c760ccf9a2ee741f94e8a6cb81512
SHA12933ba8b0873c2dfd4e47e511920bd8bff7d99f6
SHA256ef2552896dfa6c7f2c28d0bdd75badbd11028c4208cf43c0e4fac612b43dcae7
SHA512e47bab9791db741180d6087ba2860481c29abdff838bc97b083f5d1884ab8100ec6d77f58f98956fdb13ac027d6ea41e69a57372b6807dbd4d886b182d186752
-
Filesize
5KB
MD5f946ddf2122bd190fae3441e2d1303b3
SHA1941b8ed600add901e612d3b48d241f14a35b04c7
SHA2565d64e98ebc6a4ca59a3fd7296e61d16c91d00f1da7482c485ae1069e86121b13
SHA51285da096f69686689285a0a85656a8a1cc42ecb9fedccc1c2e7b7fa066824b7a8d5ef627e6bd3720e51f6282d6f389718628d9111e774640e81a4b6d4877235a5
-
Filesize
7KB
MD5d76139300900044572b6591ed9c25582
SHA110e10b909c274f57163dfe58a1f7eb8b1688a98c
SHA25630bee8f97c1b21a93e000a7fac4dc43555d16414680a06d0ab2cd3f3f7b5cdb6
SHA5122f677fd55cbd8eacd63f7dab2d33ef98b0b2b47635466bda275f7249962bce861d90bff0d9c365854e4565ebf1f8f8cb756bc575cceb9a14ded4a7e89cd32d45
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD51c0feee86448614949f6809124ec18d9
SHA1eced176cc833dadc6c412c31679eb1d96301fd7b
SHA2562b83159cb1eac0aa9b4c7d1c3d2827fa130da9592671960e43639a461ee3345a
SHA5129c1cafcef05b8b410a535dff79b7f9fe020a2b1601c1c1f6a19650996ec3393c1b2651d7435db7f1b3f6f1c52fab474284abf7fd80b822fb127ec201c4839fd7