Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
70cef397c62112778765a39662db526e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
70cef397c62112778765a39662db526e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
70cef397c62112778765a39662db526e_JaffaCakes118.html
-
Size
54KB
-
MD5
70cef397c62112778765a39662db526e
-
SHA1
333542f5310454632aea5a9541d7a2ff491cf18e
-
SHA256
2e7619072ea13c1eb78e1454660f6e417bfbb15a25a072459a903de4f58de971
-
SHA512
bf22ae54cef329a7cdc5663f131a7243a8e5eef686a30267e8b577e309a20cab2b2901f8ed365e20b3ed3a466d134d93cf6ebbd1a125a68fd1be3aae574de713
-
SSDEEP
768:0Xm9/ciJ26DiIOi1uYuocxvc3lpabdZCzfgGeHIrF1TEOKkZa1x/uUvneQNXxn2/:0Xm9/HJ2XYRcxvcrabdYzfaOtYeMXxK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 632 msedge.exe 632 msedge.exe 2620 identity_helper.exe 2620 identity_helper.exe 5612 msedge.exe 5612 msedge.exe 5612 msedge.exe 5612 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 632 wrote to memory of 184 632 msedge.exe 83 PID 632 wrote to memory of 184 632 msedge.exe 83 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3000 632 msedge.exe 84 PID 632 wrote to memory of 3092 632 msedge.exe 85 PID 632 wrote to memory of 3092 632 msedge.exe 85 PID 632 wrote to memory of 2672 632 msedge.exe 86 PID 632 wrote to memory of 2672 632 msedge.exe 86 PID 632 wrote to memory of 2672 632 msedge.exe 86 PID 632 wrote to memory of 2672 632 msedge.exe 86 PID 632 wrote to memory of 2672 632 msedge.exe 86 PID 632 wrote to memory of 2672 632 msedge.exe 86 PID 632 wrote to memory of 2672 632 msedge.exe 86 PID 632 wrote to memory of 2672 632 msedge.exe 86 PID 632 wrote to memory of 2672 632 msedge.exe 86 PID 632 wrote to memory of 2672 632 msedge.exe 86 PID 632 wrote to memory of 2672 632 msedge.exe 86 PID 632 wrote to memory of 2672 632 msedge.exe 86 PID 632 wrote to memory of 2672 632 msedge.exe 86 PID 632 wrote to memory of 2672 632 msedge.exe 86 PID 632 wrote to memory of 2672 632 msedge.exe 86 PID 632 wrote to memory of 2672 632 msedge.exe 86 PID 632 wrote to memory of 2672 632 msedge.exe 86 PID 632 wrote to memory of 2672 632 msedge.exe 86 PID 632 wrote to memory of 2672 632 msedge.exe 86 PID 632 wrote to memory of 2672 632 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\70cef397c62112778765a39662db526e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb611046f8,0x7ffb61104708,0x7ffb611047182⤵PID:184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3778648296048885369,275571548998447555,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,3778648296048885369,275571548998447555,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,3778648296048885369,275571548998447555,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3778648296048885369,275571548998447555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3778648296048885369,275571548998447555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3778648296048885369,275571548998447555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3778648296048885369,275571548998447555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3778648296048885369,275571548998447555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,3778648296048885369,275571548998447555,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:82⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,3778648296048885369,275571548998447555,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3778648296048885369,275571548998447555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3778648296048885369,275571548998447555,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3778648296048885369,275571548998447555,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:5448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3778648296048885369,275571548998447555,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:5456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3778648296048885369,275571548998447555,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5612
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
40KB
MD55ce7bdeeea547dc5e395554f1de0b179
SHA13dba53fa4da7c828a468d17abc09b265b664078a
SHA256675cd5fdfe3c14504b7af2d1012c921ab0b5af2ab93bf4dfbfe6505cae8b79a9
SHA5120bf3e39c11cfefbd4de7ec60f2adaacfba14eac0a4bf8e4d2bc80c4cf1e9d173035c068d8488436c4cf9840ae5c7cfccbefddf9d184e60cab78d1043dc3b9c4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5b0cb60faab0231a4cb4df24bbe2fc876
SHA19fe2facd5ec9f61085c22a382125d5d418160ab7
SHA2563c9a8832170c265bf03b286c150dbddad0a40e2fc527326326e988605521b340
SHA51293239055765ea987be457a2f4a622e2fa681a571d837708920e9dfbb6d7b7a10d76dea973c3f6d992aca91b3e23dce3d9b9a891c27f53355cd79944b9925e492
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5e02cadea7e2764c9fbc3660fd1015ca4
SHA10e9c693c35dbe78fe9dfc0c43b5bb010907edecb
SHA256fe0ea8e6c55f281ccb479959c4a679de1813550ab186832e2514c0b2bbdd2eb9
SHA51276490f89491a557f3e091df9d114849d1f919dae77c99b211b90e0cc7f4a6f5102e5fbd0fcb7b68f7b4891045efe6e4bb27271e849783720f2ec517e490da68f
-
Filesize
2KB
MD50cc0deb1f89d58e0ab14745efe8de4d6
SHA1132215eb2cf3af4d48232cf936fd9f50015cc334
SHA2563fb9802edfe232c35e3fc059153e8e699602d0c4e317cc427d209594edbef216
SHA512840ab664faeffc0f26b51aaa76b88d776c5498e712c89e6a808b9f5cd6a7ab1fdf931aeaacb0dde3b4446959fcfa79cc9fa1d0792f6b9f802665e6806c4d286e
-
Filesize
5KB
MD55575e513b67c4f84d47e1aa97b996896
SHA167e41d6643920b2d1982b54fe3e2df5056e34357
SHA256e337317286409acb13d78c7d2b8f1d38dcfc1229d2d894be37c61268ab098e79
SHA512e7e0f83a21488e771fda272e50f08b8c688cdf0aded0af0606079fb6096174d08b86aabd0b6edcef9fc4cabe24ae8585ef13271ea1ba4b3d193e740ba7a4e755
-
Filesize
7KB
MD5e7fc816c122cf56cd97571868d980e5e
SHA156164fda6e79f23b099495e21f031ab225d28072
SHA2562565bed3e4b754fb3c05027af5f5ea478900b913d80eb74a9d2125db279fcfb0
SHA512ae2365a1eb03212f3defeefe4971da192bc0e387916c9e7ffc9addd3e0e8ae4873e9221ee8225810cf02c9bfda40280ab305c2372142cd9a226a800a5685000b
-
Filesize
7KB
MD54f0ce3fa6f57a101553b4e84fde216e7
SHA1b6dd8a341baa0f5432053205d61d53fb94f13a16
SHA25651cdb83cb0e3d107c9ddc7615a5ebbbe4c9bd3cda10223750aeed0c887b7e289
SHA512b8dda62e5144ead8b494e2bd3006cd423537c0f75c15b3a3f107504b2f179fbd495e55011b701bd98026ad8d9b1b860b9e2886d65390e608b6e744a502d35829
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5eda4fdcc7a0eeadbe4641a8e13c6b239
SHA17cc69b158faf6d6d077b3236fe85da426e6357ee
SHA256392c39d4493f1d799bb3a622b07eafb8d06d2bbed2445fd0a3e337c4c56d9911
SHA5123c63e580b14e938fb0be5c1af28a79b5c8aaca5ecbc12e395cc02719a4a5cfc7e720cb13775cf16c2eee5777e961df9425f690a14d8bb48bb692f6dd598e8652