Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
923681327972a8f1d14f20fba52ced24_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
923681327972a8f1d14f20fba52ced24_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
923681327972a8f1d14f20fba52ced24_JaffaCakes118.html
-
Size
175KB
-
MD5
923681327972a8f1d14f20fba52ced24
-
SHA1
856cb1f0674c1918b5134c955671218dea756f9c
-
SHA256
08d804530801f69a4596c87d671151519a99d1529cdd08dc1a93ee1fbf618af0
-
SHA512
f54353b847fa2b4dc82c5c5cf7391618f3ca59bb922b90f495275cc7515a6ebf451253d573d340341d86e7d9f4671d39deb471e483978ec3ff92c296e80083d5
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3eGNkF5YfBCJiZX+aeTH+WK/Lf1/hpnVSV:S9CT3e/FcBCJimB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2928 msedge.exe 2928 msedge.exe 4016 msedge.exe 4016 msedge.exe 4448 identity_helper.exe 4448 identity_helper.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4016 wrote to memory of 4212 4016 msedge.exe 82 PID 4016 wrote to memory of 4212 4016 msedge.exe 82 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 1140 4016 msedge.exe 83 PID 4016 wrote to memory of 2928 4016 msedge.exe 84 PID 4016 wrote to memory of 2928 4016 msedge.exe 84 PID 4016 wrote to memory of 1936 4016 msedge.exe 85 PID 4016 wrote to memory of 1936 4016 msedge.exe 85 PID 4016 wrote to memory of 1936 4016 msedge.exe 85 PID 4016 wrote to memory of 1936 4016 msedge.exe 85 PID 4016 wrote to memory of 1936 4016 msedge.exe 85 PID 4016 wrote to memory of 1936 4016 msedge.exe 85 PID 4016 wrote to memory of 1936 4016 msedge.exe 85 PID 4016 wrote to memory of 1936 4016 msedge.exe 85 PID 4016 wrote to memory of 1936 4016 msedge.exe 85 PID 4016 wrote to memory of 1936 4016 msedge.exe 85 PID 4016 wrote to memory of 1936 4016 msedge.exe 85 PID 4016 wrote to memory of 1936 4016 msedge.exe 85 PID 4016 wrote to memory of 1936 4016 msedge.exe 85 PID 4016 wrote to memory of 1936 4016 msedge.exe 85 PID 4016 wrote to memory of 1936 4016 msedge.exe 85 PID 4016 wrote to memory of 1936 4016 msedge.exe 85 PID 4016 wrote to memory of 1936 4016 msedge.exe 85 PID 4016 wrote to memory of 1936 4016 msedge.exe 85 PID 4016 wrote to memory of 1936 4016 msedge.exe 85 PID 4016 wrote to memory of 1936 4016 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\923681327972a8f1d14f20fba52ced24_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa9e7046f8,0x7ffa9e704708,0x7ffa9e7047182⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,1119407443335448392,2003586673818335782,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,1119407443335448392,2003586673818335782,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,1119407443335448392,2003586673818335782,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1119407443335448392,2003586673818335782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1119407443335448392,2003586673818335782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1119407443335448392,2003586673818335782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1119407443335448392,2003586673818335782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2552 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1119407443335448392,2003586673818335782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1119407443335448392,2003586673818335782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,1119407443335448392,2003586673818335782,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3444 /prefetch:82⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,1119407443335448392,2003586673818335782,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1119407443335448392,2003586673818335782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1119407443335448392,2003586673818335782,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1119407443335448392,2003586673818335782,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,1119407443335448392,2003586673818335782,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,1119407443335448392,2003586673818335782,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5c3cb9934c16a06fe82e4d33090370e8e
SHA183767f83fbe1211cb22d906cbdcef67c57c1b6d2
SHA25617276c4194718f04051e68cfabadecaeec87ede7d618ff69018a5686fa7ef1a8
SHA5126a34628b651fc6364903186649abf83030eb6de305915a37c9191c68688b8f0528a0168a7316622eb56b0d394d3bb8c6fb6e37b12b652636c85704ef161a5c55
-
Filesize
2KB
MD5a90e880bfb94b5a915783ed019880ccc
SHA1e5ad196950143d09dca2eeb97b600a47ce53f651
SHA256fa3a1da679298992444700e2b09197b3643e723175443624eee9889fa8d8b418
SHA51276332193af3bc1d7bcc04cf0364ae5fa76e5a0b37d5f97e24cc2046ebe1cb39c8d61e14713b18f7644c460b52387710ecbb82ec95cfdac8c98ed9d3a289466aa
-
Filesize
2KB
MD5c7af6375b27bd940868f3394f42cc77b
SHA18d6f33df4aa50a152f6e289d0c4ebce6c707517c
SHA256af765daa245a6f53bd8beebbd59cf74418108d2a1867bee6262b384e19a53350
SHA51233f5447470ada365e9da74cc079375f332c485ab12718f5d7e35d4b293ee0f56c3d65d57897eaf8fea205238929b03282ebe9625b3c56c25fe844e859acacdf6
-
Filesize
7KB
MD5abcb3c497dce069ecba33672a8cea868
SHA10b93f9f6ddfd52a751318bfa11af51d78bf320cf
SHA25609eac22cb82fef3443e7f3a79eb090d674543bf18caba84bb24511c0e772f165
SHA512f535be30e2670f158345196d710e02c1c4b866736c8ac3ea7f1b9ccc43bb4e8343cca47fef49baa86a26afcf741892e28c774ca6f9b8ad75e623d79bca8c3266
-
Filesize
5KB
MD5672bc21b535e458dce89d389fd7a669f
SHA12d2e6adc9fb79daefd8269a9863b0f3ec716f18a
SHA256f375c4760a11d84c0ba481507bb2110625fb4e4d6853c4c11ae40226d837b87d
SHA512f580b934f636c9f06048db9b3674b7eef86c67da2cfcbc2f8a1baaa4f4e29f906dfd8299fb2b3b05b276217909866e0e2331a39cfe73342833cf010736b32f0b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD57878e8fb2190a4a3a3e98f5f85b76c3c
SHA1f84c667dfb349e53bba6c4452e5275c6ad9b8a78
SHA2566927bc948e223d0314fac758d98032859217dabb6f489a54b637ab29ac31faa2
SHA5123b0a3e84db6b79360db720ef0c6a7284a6955d6c982b2eabb683b3e5db8c45d75e5516ae6027b9f25a55c40d034c34dc60d39a561e5f07fc16045a9c4b489ae0