Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
8b6e6f59687bfa4ff6b0706b49da199a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b6e6f59687bfa4ff6b0706b49da199a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8b6e6f59687bfa4ff6b0706b49da199a_JaffaCakes118.html
-
Size
45KB
-
MD5
8b6e6f59687bfa4ff6b0706b49da199a
-
SHA1
497212ede5b9ec2ac71c74c8357f779a5b582847
-
SHA256
0f1c90b99580c627901c859aa91212f8f74efe87709bc75a348815bff7be01a6
-
SHA512
665cc7d8ee010201c728acbfffa3e3b44438401a496fdea3a713849b309080aef1bee0044da6e1711226f4cd5185f72fd99447563b0c8684e6ee29cdb4c85a48
-
SSDEEP
768:wED6L8mFlYc0mqJkiud/jf5MfeSpnbopfdO2SRdr:ND6ImFlYuqJ0tf5McpfdOr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 4432 msedge.exe 4432 msedge.exe 1832 identity_helper.exe 1832 identity_helper.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4432 wrote to memory of 4436 4432 msedge.exe 83 PID 4432 wrote to memory of 4436 4432 msedge.exe 83 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 2384 4432 msedge.exe 84 PID 4432 wrote to memory of 4368 4432 msedge.exe 85 PID 4432 wrote to memory of 4368 4432 msedge.exe 85 PID 4432 wrote to memory of 3344 4432 msedge.exe 86 PID 4432 wrote to memory of 3344 4432 msedge.exe 86 PID 4432 wrote to memory of 3344 4432 msedge.exe 86 PID 4432 wrote to memory of 3344 4432 msedge.exe 86 PID 4432 wrote to memory of 3344 4432 msedge.exe 86 PID 4432 wrote to memory of 3344 4432 msedge.exe 86 PID 4432 wrote to memory of 3344 4432 msedge.exe 86 PID 4432 wrote to memory of 3344 4432 msedge.exe 86 PID 4432 wrote to memory of 3344 4432 msedge.exe 86 PID 4432 wrote to memory of 3344 4432 msedge.exe 86 PID 4432 wrote to memory of 3344 4432 msedge.exe 86 PID 4432 wrote to memory of 3344 4432 msedge.exe 86 PID 4432 wrote to memory of 3344 4432 msedge.exe 86 PID 4432 wrote to memory of 3344 4432 msedge.exe 86 PID 4432 wrote to memory of 3344 4432 msedge.exe 86 PID 4432 wrote to memory of 3344 4432 msedge.exe 86 PID 4432 wrote to memory of 3344 4432 msedge.exe 86 PID 4432 wrote to memory of 3344 4432 msedge.exe 86 PID 4432 wrote to memory of 3344 4432 msedge.exe 86 PID 4432 wrote to memory of 3344 4432 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8b6e6f59687bfa4ff6b0706b49da199a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97d9546f8,0x7ff97d954708,0x7ff97d9547182⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,16015636138587058213,13958869566650059249,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,16015636138587058213,13958869566650059249,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,16015636138587058213,13958869566650059249,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16015636138587058213,13958869566650059249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16015636138587058213,13958869566650059249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16015636138587058213,13958869566650059249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16015636138587058213,13958869566650059249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16015636138587058213,13958869566650059249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16015636138587058213,13958869566650059249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16015636138587058213,13958869566650059249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16015636138587058213,13958869566650059249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6316 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16015636138587058213,13958869566650059249,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6328 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,16015636138587058213,13958869566650059249,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6724 /prefetch:82⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,16015636138587058213,13958869566650059249,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6724 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16015636138587058213,13958869566650059249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16015636138587058213,13958869566650059249,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,16015636138587058213,13958869566650059249,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1252
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD51e6d147d88570906e7df4a3b6f8021d6
SHA1da875daeff2e215adf8f5665e0c9272a6dc00bab
SHA2562b16944435e12e981a265c8ecf930638ad4080b621700693cd537ef4aa1eedb1
SHA51217f9266d5d894848ebf65e37992970499c5486b3cbd1e6da79b2927218c6990a895f5324ba5ef8f4a67597c6577d8f1a0b1f380c2e0401e1cd9dc327d29cf1a0
-
Filesize
2KB
MD59bc6e5485469b5eae313508c2a1c1663
SHA1724da49f8bdd0bf63edc5c005e666915a5c41137
SHA25623c7828dc273939d6be0cb4e2cf406cde3481e42f1017b08bbe0a2bf156c467d
SHA5124a70a9dd62cd4e7aba9afb3552d7351215ffba0b3c3b9cd7da0979875e37c17926cae67baf8e42e11be0c85dac3ff8baf6bb727e5c35f5fe9d9d601b9ff1f7ee
-
Filesize
5KB
MD580b6af09d5f5a660fcc01f8bad97983b
SHA14168acaf65aef6aff6828833e704875d2dcbbbf7
SHA2565aee15437c36b04add0b56f20412ecc757009713a0ace0c6c11d23e6929af83b
SHA51224cbbda873a57c927611b953b9ec3e4335d3d33befd8b949af588a6b3a352426cbf32c4f23d6e68935bf109e2404a12aef4911b1b6788ab9cae8d217589f47ed
-
Filesize
6KB
MD53361e814316c9434fe2b764fd97cfa04
SHA1f84c2f995f05d3d4ae9b6a12f80a5354398f82ea
SHA25649e0d0b2e9d22c63e686bb749c9e648cb62c0ef81805a3994258b9087ecbf04b
SHA5126d6ce03cc61905efc8716ec60ff1ddc59749d96c0ce51109358ed634a29bdba29e1d37aa586f3417b6643e9c888c0dae358ec7b7e2301129f9fa982bdf4c1bb0
-
Filesize
6KB
MD54819782902f4da880b08c8951ec48c03
SHA1ff7d633fe9ae4083c4f37830f4d480d04294a41b
SHA256b36efc3b6261dbb9a8611d9987b5ba6cb4c158c708e6c4c6dbcf075a267a5401
SHA51273b2cd3eebce606631147401b7134e675035569a019597ffb7ab044fd4668e49daf782f8013f789e6f34448cac0837a18cdd81dcd2eba462978a427bfff9b7be
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57a3193391f0245c26d4e56e23eb9baa0
SHA1d74b7a362413d3e3853a0aeb2ddf11aa171ec34f
SHA256e3f74baec9a8dd5091cc6c89d82e203000185980b8b414b8bd724d79d7cadd07
SHA5127101427f7d00538bb8fb2ccdf5d5c6f34319fdb986bbe18fbcf96d8dafe855bab55c43f313f5861cb836fa7cacd3cf7e1e451b688ed02a86b6c4f10e5046efdf