Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2024 00:22
Static task
static1
Behavioral task
behavioral1
Sample
5e4e6ef5106db0bd72553c5bcf9137f5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e4e6ef5106db0bd72553c5bcf9137f5_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5e4e6ef5106db0bd72553c5bcf9137f5_JaffaCakes118.html
-
Size
22KB
-
MD5
5e4e6ef5106db0bd72553c5bcf9137f5
-
SHA1
0c97771eaa77939db5c6e5594f01ea1160c23e54
-
SHA256
2f458e8babadd8425764f75967b7ed0007ba7552617254bb6e68b411fdc75689
-
SHA512
d8880b40874f406ef10797c92ff00ccdd78524fe2b4ce01a1533f492a88ea6fbaa4110490f99857c41f6924248bced3ff5e4c0411f4c6d2baf9cc3a104e7ee96
-
SSDEEP
384:Wu6gKfo0lN2g/GqKcIOfZG4ITHnBgRAa1BJFhvhWCBL/7nAZcRzttSb4FviFJa8L:mlR/GAE4NFviFlL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 3116 msedge.exe 3116 msedge.exe 4196 identity_helper.exe 4196 identity_helper.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3116 wrote to memory of 2560 3116 msedge.exe 84 PID 3116 wrote to memory of 2560 3116 msedge.exe 84 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 2276 3116 msedge.exe 85 PID 3116 wrote to memory of 4884 3116 msedge.exe 86 PID 3116 wrote to memory of 4884 3116 msedge.exe 86 PID 3116 wrote to memory of 2884 3116 msedge.exe 87 PID 3116 wrote to memory of 2884 3116 msedge.exe 87 PID 3116 wrote to memory of 2884 3116 msedge.exe 87 PID 3116 wrote to memory of 2884 3116 msedge.exe 87 PID 3116 wrote to memory of 2884 3116 msedge.exe 87 PID 3116 wrote to memory of 2884 3116 msedge.exe 87 PID 3116 wrote to memory of 2884 3116 msedge.exe 87 PID 3116 wrote to memory of 2884 3116 msedge.exe 87 PID 3116 wrote to memory of 2884 3116 msedge.exe 87 PID 3116 wrote to memory of 2884 3116 msedge.exe 87 PID 3116 wrote to memory of 2884 3116 msedge.exe 87 PID 3116 wrote to memory of 2884 3116 msedge.exe 87 PID 3116 wrote to memory of 2884 3116 msedge.exe 87 PID 3116 wrote to memory of 2884 3116 msedge.exe 87 PID 3116 wrote to memory of 2884 3116 msedge.exe 87 PID 3116 wrote to memory of 2884 3116 msedge.exe 87 PID 3116 wrote to memory of 2884 3116 msedge.exe 87 PID 3116 wrote to memory of 2884 3116 msedge.exe 87 PID 3116 wrote to memory of 2884 3116 msedge.exe 87 PID 3116 wrote to memory of 2884 3116 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5e4e6ef5106db0bd72553c5bcf9137f5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbcf3246f8,0x7ffbcf324708,0x7ffbcf3247182⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,753581238706510034,17069830544535611062,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,753581238706510034,17069830544535611062,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,753581238706510034,17069830544535611062,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2524 /prefetch:82⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,753581238706510034,17069830544535611062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,753581238706510034,17069830544535611062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,753581238706510034,17069830544535611062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,753581238706510034,17069830544535611062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,753581238706510034,17069830544535611062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,753581238706510034,17069830544535611062,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6216 /prefetch:82⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,753581238706510034,17069830544535611062,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,753581238706510034,17069830544535611062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,753581238706510034,17069830544535611062,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,753581238706510034,17069830544535611062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,753581238706510034,17069830544535611062,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,753581238706510034,17069830544535611062,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3032 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5f3e557d92945c70708f6b459134f10ef
SHA187f282208b74817df1de0c67023938874069aeb9
SHA25631565b783e3cc86646ed36174a3556b664144a32743254e8dcd9810644e4fe54
SHA512dcac97a69cf2e3a314e4ea5ab7a35c3d5f1804b00b2d602914181a01bd0cbefcd994fbbfa5cfb059732afa2f05433a2cdc2bd5108ff257ba70e0a58f8f27abda
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5cca937ed3f4771e0868569a8e88e1688
SHA1a76b30513b98fe6be59df9ad7696f52e47c96294
SHA256cac2e3c29dc0e9edb89e606a90b700e619f5031b6cd81e66ca5aa692327d6eb7
SHA512f56a08222cc048eb3703397e971c6becae123450b8bad09fe95b1928df19dd3219e413af269845d46657a24ea6a5a04fbedcf3256b08164d9a647266bb0eebc9
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
409B
MD579b10e728f299b17a41327d1e90d330e
SHA1a3dd0e121be3b168f43a63a7ed89e4dbba1ac7dd
SHA2562083b1374302e390fe0732e571b2b9d42801a58d6d8b92c9f7ed39c36e8c0c4b
SHA5120492b547877841bda264f800de881cfad641cd31e3c7d68f1d88871cb55d726bee0dc23472336ede7d6895f1229e8e18bd2f793f228e554ae9f304a71ae8c45e
-
Filesize
644B
MD5dc0156d540477b22c6150d4cce3bfe94
SHA183b4bb6778d9b5023ffdd5f64109caf4e91f9d7d
SHA256414ace403889394f47325ca5d925602a8bf20042f9f18099e58d63551e5e82b8
SHA5122d3e227165bbf1bd9ee2486579856de205f32146e46b3279b011d92b50c15f6569d7f6224eecb9737f72b0261fcf6966910c57786931b5ff1f9ed3e9ef52966a
-
Filesize
5KB
MD5906b4eccbfe74c911872e3cd03c33f85
SHA1f6669f971e901e980d79b9b8ac79dab36f95731b
SHA2567e753b684a25e88a5dbe0abf5aa0a35fff362d4844da82a235e74eb48e4fc70a
SHA5122ca61bdf2d5a6a694ece070c1cc6d25daf9cb136199af398bd06a22a528689f813262a537eb9a8da04bd0d2432ecb0ff069845fe731f0f854427072a002e5e13
-
Filesize
6KB
MD5b1b5dbdffd812996fb6a847af51610c8
SHA176eb3ed6f0810563783644d7042c24bb48bca2ec
SHA256340d6628401837afb2204ba0e7427a31a373f8817fd2ad959e9e0bf4179f7684
SHA5124a34d41bc143a13b34afa3fff2ee9d25af9641e96822abbab49223c0914bfd6d08d02c4f4130ccca7bc1494d61f3d7a83c0eba0e0bc37129c220ec9632d2a018
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bd1d9c19e59124b0731ccfb4baf8663f
SHA137236a89f3fe53b72f916fe9b2bf5e3ed7f3f54a
SHA256dbbdb9676d5ac32765176afe403d90a61d2e91fc67d16f6edcd7ca0e12c8ee04
SHA5127d3b008465eea5ab27f2a52cfd7a90cca9d3b2fa155de80f3d3c8a420d8d1323ad7cc964f6a3b9a4391d560573e78651c6f40d69bde004cba373f392440045fe