Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
43190bbda0b432481d282aee266b5a67_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
43190bbda0b432481d282aee266b5a67_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
43190bbda0b432481d282aee266b5a67_JaffaCakes118.html
-
Size
175KB
-
MD5
43190bbda0b432481d282aee266b5a67
-
SHA1
197285c6e557ef6bf882e3c0695701d04630eee0
-
SHA256
64c44fae67a9c6b63c94103f5556d41d4ed892642584f8efedf675c83321a0a5
-
SHA512
70c6b04d90ba159dba2144a46878e24f3de893fe94e19ae6c29aa365c13becedf82fd836402a7666890f872d26cb674bd0bfce1fedc29d408387e8d5fcaea74a
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3jGNkFDYfBCJiZC+aeTH+WK/Lf1/hpnVSV:SHCT3j/FaBCJitB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 2724 msedge.exe 2724 msedge.exe 4012 identity_helper.exe 4012 identity_helper.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe 5264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2724 wrote to memory of 5012 2724 msedge.exe 84 PID 2724 wrote to memory of 5012 2724 msedge.exe 84 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 4148 2724 msedge.exe 85 PID 2724 wrote to memory of 1396 2724 msedge.exe 86 PID 2724 wrote to memory of 1396 2724 msedge.exe 86 PID 2724 wrote to memory of 412 2724 msedge.exe 87 PID 2724 wrote to memory of 412 2724 msedge.exe 87 PID 2724 wrote to memory of 412 2724 msedge.exe 87 PID 2724 wrote to memory of 412 2724 msedge.exe 87 PID 2724 wrote to memory of 412 2724 msedge.exe 87 PID 2724 wrote to memory of 412 2724 msedge.exe 87 PID 2724 wrote to memory of 412 2724 msedge.exe 87 PID 2724 wrote to memory of 412 2724 msedge.exe 87 PID 2724 wrote to memory of 412 2724 msedge.exe 87 PID 2724 wrote to memory of 412 2724 msedge.exe 87 PID 2724 wrote to memory of 412 2724 msedge.exe 87 PID 2724 wrote to memory of 412 2724 msedge.exe 87 PID 2724 wrote to memory of 412 2724 msedge.exe 87 PID 2724 wrote to memory of 412 2724 msedge.exe 87 PID 2724 wrote to memory of 412 2724 msedge.exe 87 PID 2724 wrote to memory of 412 2724 msedge.exe 87 PID 2724 wrote to memory of 412 2724 msedge.exe 87 PID 2724 wrote to memory of 412 2724 msedge.exe 87 PID 2724 wrote to memory of 412 2724 msedge.exe 87 PID 2724 wrote to memory of 412 2724 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\43190bbda0b432481d282aee266b5a67_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa797e46f8,0x7ffa797e4708,0x7ffa797e47182⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10124530363016515741,8984246007707013850,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,10124530363016515741,8984246007707013850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,10124530363016515741,8984246007707013850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:82⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10124530363016515741,8984246007707013850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10124530363016515741,8984246007707013850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10124530363016515741,8984246007707013850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10124530363016515741,8984246007707013850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10124530363016515741,8984246007707013850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10124530363016515741,8984246007707013850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10124530363016515741,8984246007707013850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3564 /prefetch:82⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10124530363016515741,8984246007707013850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3564 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10124530363016515741,8984246007707013850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10124530363016515741,8984246007707013850,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10124530363016515741,8984246007707013850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:5344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10124530363016515741,8984246007707013850,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10124530363016515741,8984246007707013850,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2696 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5c89eb7685e6975aea88aa6a4f725bc5b
SHA1190b6b50db98d72ae809cd47ca2257668aa9b6ac
SHA2568b0cd09be7c9065776ec633435ce6b529537b4e52c70365bfcb8292ee6eb0575
SHA512f43d8a2d529302034f75a3770bf08aef75a4e73e92260b26e981489c2773e508934d404871af603e53c616f18a60f9f4002919880c79968e174ebdbb64e585e8
-
Filesize
2KB
MD526d2ae86a578d50ee43eb62664ee25a3
SHA1c73d803da7c6a3fb45c9a1db9984b2c7cc40f4b5
SHA256f9450aa4e94460ef794f99203ce53d280b0dc3992b935e9f74ccf5138b133bf3
SHA512cf27684343dc1094f2fe62ffcff8dda95a3d499bf4da3ec826caf805d96f051b6c875e66cdb8b3d11781d941eca68e3b0b3df25f3f1ca121e82c1956a1ae68f4
-
Filesize
2KB
MD56c041876d6deb37935891f75f8c9a815
SHA1de57cd29c90f3ae8c3aa2a3270912376879b2f47
SHA2561cf3bb9782144482761d2e28e1fd3edc6c4dc2005f55ef00d56d8634f25225ab
SHA51226bffc5daa70d896c11951b524264d6194b4c23f363cce1fe172230715b4bc02beda2b3d0af614f569ae5464fadc42e05ab52b7fc16240fd19289e9756185455
-
Filesize
5KB
MD5ac34bc2fc8b2a80eae22cbbc0af595f2
SHA1d07b45933ce4b353f3263c4094775829b190512a
SHA256057a6901dba0969e53aabd4aa917829d1e6766d03df79fac334eaec716ad5af4
SHA512b13dea9aacb64821ecd26534a9c0c9e54a6eaf4cccdddeca97ddae568dbff774f926b5c8aa6353c16c9e714c992a3c61cfcf803b14a1f1ea39c78fcaf19303ad
-
Filesize
7KB
MD58f34da003db10a675b759b916775088c
SHA1ab68e113072f63274fec102a75858b5316c8e74e
SHA25624af28e97a302d57f6f134a723142c3546d2d68998e01adfa20d54709e8d01de
SHA5123b76ab4fd5b2f97ad7d2929b1debceb1d0d5c57793858808edf744fc8d6011063292199ca68df7e96c2d889c005e19af7ccba296dc6bf7e270756dd67729a82a
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5ec1e2c040fd1fd4189e91950199501bc
SHA13d97a7e2dbb740b572101f24113ec18d0c729efc
SHA256cf02399f11444f6259a17d9cd8e23dd34fed2dc2e0f0da7846273da3d159f64f
SHA5124a8d4e9a63ea0f447488aefb41e0e8b838b07ca5cd3b10114c233d7d9557ca89e2b9c038cdccb73f25c0a55e3269e8eabb7a8f9db722dbac57e726212e800b37