Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 00:43
Static task
static1
Behavioral task
behavioral1
Sample
b0f41d74352d8c9df5346372e048df50_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b0f41d74352d8c9df5346372e048df50_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b0f41d74352d8c9df5346372e048df50_JaffaCakes118.html
-
Size
175KB
-
MD5
b0f41d74352d8c9df5346372e048df50
-
SHA1
d3722aaeeaff09531b3fb94d9b04bc002e80334e
-
SHA256
11371a9235b1404f38c2673245500a9decc6b7c0454265b6cffb64bb764150c3
-
SHA512
00ca2bf299c7f2aeb863ef118d0e50a60429ba94794d6a523ad93e1fe3ba9bd9414d8d9fa10f244f6ad958d064c909f86470c94202915faa23c46038ddb9d77c
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3yGNkFFYfBCJiZn+aeTH+WK/Lf1/hpnVSV:S9CT3y/FwBCJiyB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 1552 msedge.exe 1552 msedge.exe 3096 identity_helper.exe 3096 identity_helper.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1552 wrote to memory of 2368 1552 msedge.exe 82 PID 1552 wrote to memory of 2368 1552 msedge.exe 82 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2992 1552 msedge.exe 83 PID 1552 wrote to memory of 2248 1552 msedge.exe 84 PID 1552 wrote to memory of 2248 1552 msedge.exe 84 PID 1552 wrote to memory of 2012 1552 msedge.exe 85 PID 1552 wrote to memory of 2012 1552 msedge.exe 85 PID 1552 wrote to memory of 2012 1552 msedge.exe 85 PID 1552 wrote to memory of 2012 1552 msedge.exe 85 PID 1552 wrote to memory of 2012 1552 msedge.exe 85 PID 1552 wrote to memory of 2012 1552 msedge.exe 85 PID 1552 wrote to memory of 2012 1552 msedge.exe 85 PID 1552 wrote to memory of 2012 1552 msedge.exe 85 PID 1552 wrote to memory of 2012 1552 msedge.exe 85 PID 1552 wrote to memory of 2012 1552 msedge.exe 85 PID 1552 wrote to memory of 2012 1552 msedge.exe 85 PID 1552 wrote to memory of 2012 1552 msedge.exe 85 PID 1552 wrote to memory of 2012 1552 msedge.exe 85 PID 1552 wrote to memory of 2012 1552 msedge.exe 85 PID 1552 wrote to memory of 2012 1552 msedge.exe 85 PID 1552 wrote to memory of 2012 1552 msedge.exe 85 PID 1552 wrote to memory of 2012 1552 msedge.exe 85 PID 1552 wrote to memory of 2012 1552 msedge.exe 85 PID 1552 wrote to memory of 2012 1552 msedge.exe 85 PID 1552 wrote to memory of 2012 1552 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b0f41d74352d8c9df5346372e048df50_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d79046f8,0x7ff8d7904708,0x7ff8d79047182⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4582544061673125961,8875237335870451604,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,4582544061673125961,8875237335870451604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,4582544061673125961,8875237335870451604,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4582544061673125961,8875237335870451604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4582544061673125961,8875237335870451604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4582544061673125961,8875237335870451604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4582544061673125961,8875237335870451604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2180 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4582544061673125961,8875237335870451604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4582544061673125961,8875237335870451604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4582544061673125961,8875237335870451604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4582544061673125961,8875237335870451604,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4582544061673125961,8875237335870451604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4582544061673125961,8875237335870451604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4582544061673125961,8875237335870451604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4582544061673125961,8875237335870451604,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4582544061673125961,8875237335870451604,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5b01dca699acbebfc68e22eab568f253d
SHA12269375b3d476660e3215970d1e9edce4964e81a
SHA256e7a05aea1341c28cdb50252960e02637ecb00cead23ca64d43553a8b1ecfa6f1
SHA51284a76a733822f6a325835265429402b89c561a49df319af6fa1d04a8b07392703d42c710264167b0df29b2c2da09d2527d61e0b1ca4258abbb8f21dcabf8c4d7
-
Filesize
2KB
MD5c426112f40b3cac37e1b539a9e53bfbf
SHA11c7e3101caa9da7c3dcd37372794e97d104c88d8
SHA256567935fd05860415de892ca42a03f6500b4c5996e0a911fd401bfe56b61b51d2
SHA512f29a53926a0cc19c789d5c15e4fe8c8bae4568b133726d598472f983b892cae0b572facea54a502363632cb671b1ae045d3fe062478c65d0a24c79367c6638c7
-
Filesize
2KB
MD58932ef2d9c356a8aba272a8eaaebfcbd
SHA1d541bbb3db5466f226cbfcc5cf632813d9d2f2fd
SHA2565c91a89b27c4270c8dc47358ebd8f200ef048ccf275d1e3f6955329287b2aebb
SHA5126cb1544fc84fe9e0084886142334818c9913ec0f5a2159d1c0e4c4e19bcaa2eb354d5285f95a1e2cc5822969f95aa29c220e0ec0f4f5a3ec52f96cbd4d714865
-
Filesize
6KB
MD5cc2bfd0e564e4b5218a0cf9ced92b480
SHA180c00ba4ffd2050e719060f7f551a644070d2a63
SHA256013737ba1146efd7af7886c025a35413a07f1bc2fd2e3a90624754a7b212c87a
SHA512344ef20cdc2c2b7847b678e6680900ee1265e250d913eeb6c3b0cd3df628896d9280c04855b5b927c27944163d212cb91deb5074e2cf948232b136a15e1e07d7
-
Filesize
7KB
MD51da0cc028122934cda7375817e185798
SHA1b01ae0edcf30cb3b5c637702395444cd46baeb7c
SHA256dbfaf619fa72473258ffb895d40f11e9792c6d963638c6ac6660db046d20ee9b
SHA512ae7d7955224919a58932ccaea648523868cbb726e0db6e35d99fec13daf04c638db2465de871545b063d3dddb2b829e8b5134e2a40c9ee166dbc041dcce8468c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5e66ae01704f354efe823c4f7db38b54a
SHA1787245c8aef458c508ce3fb97e49cca9df3277a4
SHA25626dde40e8d1c5a852a30e44835c0f9171ec4f7b3f2e8f8e33bb0b3ad3cdf41ab
SHA51212936a7470a6a8f3f4dfeba97b5dc326995b760f48a752e7e7406364e8393628cda1961b6bc3240f816950875c061325679cbb6423a10b605f0a6fea5c680b66