Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 05:03
Static task
static1
Behavioral task
behavioral1
Sample
d122aa97d4ae635305c53c3781a0bf3b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d122aa97d4ae635305c53c3781a0bf3b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d122aa97d4ae635305c53c3781a0bf3b_JaffaCakes118.html
-
Size
24KB
-
MD5
d122aa97d4ae635305c53c3781a0bf3b
-
SHA1
1bc90e4fdb910665b5601174fc908d5af1c6906d
-
SHA256
7b746a939f08b897eaa69f5d7d21c737cc74006328a4514631690db5d8577060
-
SHA512
927dafad0d6dadbe2f97d8a3de9518eca54f45f17689baa738af83e857e4e735baf68f83ca30f9be9903ffcb8fdafa6c53a22aa40a944f687c0fc3d2a5abc6fa
-
SSDEEP
768:IYPMBFCOTXQMabSatL8SjatjIRQ07dlPYFZItvq4fYtOqE:bPMBFCOTXQMabSatL8SjatjIG07A4tv/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5016 msedge.exe 5016 msedge.exe 2844 msedge.exe 2844 msedge.exe 4148 identity_helper.exe 4148 identity_helper.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2844 wrote to memory of 1928 2844 msedge.exe 82 PID 2844 wrote to memory of 1928 2844 msedge.exe 82 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 3948 2844 msedge.exe 83 PID 2844 wrote to memory of 5016 2844 msedge.exe 84 PID 2844 wrote to memory of 5016 2844 msedge.exe 84 PID 2844 wrote to memory of 3244 2844 msedge.exe 85 PID 2844 wrote to memory of 3244 2844 msedge.exe 85 PID 2844 wrote to memory of 3244 2844 msedge.exe 85 PID 2844 wrote to memory of 3244 2844 msedge.exe 85 PID 2844 wrote to memory of 3244 2844 msedge.exe 85 PID 2844 wrote to memory of 3244 2844 msedge.exe 85 PID 2844 wrote to memory of 3244 2844 msedge.exe 85 PID 2844 wrote to memory of 3244 2844 msedge.exe 85 PID 2844 wrote to memory of 3244 2844 msedge.exe 85 PID 2844 wrote to memory of 3244 2844 msedge.exe 85 PID 2844 wrote to memory of 3244 2844 msedge.exe 85 PID 2844 wrote to memory of 3244 2844 msedge.exe 85 PID 2844 wrote to memory of 3244 2844 msedge.exe 85 PID 2844 wrote to memory of 3244 2844 msedge.exe 85 PID 2844 wrote to memory of 3244 2844 msedge.exe 85 PID 2844 wrote to memory of 3244 2844 msedge.exe 85 PID 2844 wrote to memory of 3244 2844 msedge.exe 85 PID 2844 wrote to memory of 3244 2844 msedge.exe 85 PID 2844 wrote to memory of 3244 2844 msedge.exe 85 PID 2844 wrote to memory of 3244 2844 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d122aa97d4ae635305c53c3781a0bf3b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab66646f8,0x7ffab6664708,0x7ffab66647182⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,10650130007322621631,4137234557025852693,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:22⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,10650130007322621631,4137234557025852693,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,10650130007322621631,4137234557025852693,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,10650130007322621631,4137234557025852693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,10650130007322621631,4137234557025852693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,10650130007322621631,4137234557025852693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,10650130007322621631,4137234557025852693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,10650130007322621631,4137234557025852693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,10650130007322621631,4137234557025852693,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6920 /prefetch:82⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,10650130007322621631,4137234557025852693,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,10650130007322621631,4137234557025852693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,10650130007322621631,4137234557025852693,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,10650130007322621631,4137234557025852693,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6744 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,10650130007322621631,4137234557025852693,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,10650130007322621631,4137234557025852693,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5464 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0a80d20a-43f0-43a1-95a3-d2e48dc1a39a.tmp
Filesize2KB
MD554d3fea44923a22b49a1e94a0b865908
SHA1f2638071e3105b5d48a4976eb10cc65a4d641302
SHA25604aa44e68a48c641c5e56d4cce3e993f6557e0ed7e7a765783982facdb640dc9
SHA512c93dcdeabd11462b98f971c67f9c38d6373367911cea71817aac977bce9f6ca8a31ce5f46bc08f71ada43544b77365256681baecacb86e333e8e8a80b57b2be0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD53235a48f0e0ae164ba1da35e23b0242a
SHA12e7671d7be8ac8fbfca1a562e94d2a66d84e77bd
SHA256e7cf059f5d8015a7ed2271ec714a7a613d06c797d64a47b111cd4d9516e82b86
SHA51250c763545c86338fe7a6c770fec18489a1ac2debf63fd0cdc975cbbc39c5edea9ff55d57ca665403aa07e05e02d82004508650d5170b5fa51c8cb883ea30989c
-
Filesize
2KB
MD51a68928df94bbc87c786242500e886c3
SHA18abba1a0badaa7a4d06da70ea5fa01919bae5f08
SHA2569899e051bf8a3d7add962eb02ae0fe9fb597dffb49e431f62cf564f24d104b7d
SHA5129fd43648dac80683b28d83bcbbeeaf63f62db09ba4d1971e9c97815216059726ba7dc429438170bc014a27909510d1661a2329afcbf7c612bce3cbfefd38e020
-
Filesize
7KB
MD54c29ddd84a84a43c91bc03a26b73204e
SHA11903b3f301079e889335f0777624cd35b38e77e1
SHA256b3c7ab334225b536354aca06609c2e51b14a9f4eca8eabee900020498aee1320
SHA51263765f6d5deec77dd7c659da44b73c2ad847cfe402769ab50ca5e7e2439796d942578adb9bfef468a9d04bd079b93d20e433a220aaee8035e6131a158e65e67a
-
Filesize
7KB
MD571b1eb6ae51da945b6d4c1f978d513ce
SHA14f60ef1b7f984948dbfeba702fd364e5aa11473d
SHA25600f2b5a430b93c471c4b7a5ac91e10bbc4a3b9c603a36f4c3bfbdb36166102e6
SHA512132e1ce0698e18bbbe4ce172d8adf0cae1350c019d3acaa60cad5289ac3f22dbc458847fb681c015d1e552f8a7ef0b146fc2c87faa3c0b966450c39930698320
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e82d32a9-c73c-40f7-a0a4-9d0f004c4998.tmp
Filesize5KB
MD51a25e7a36b75ab7caf7612a25b5e867f
SHA13c13a472b0e1686edbc7a0c5f6cf1a5ee481478e
SHA256f9c24e8ad62aace16c950daa6049401d53d8746b3d7f23e39ac8a8f67bf8dbe4
SHA5121a73cde30741c4de22d7ff9fa47f5487fc372cdd010e4c5b56af394316be2d15f295435c11522abf6654a361037b5e6f1eb6499e37b3bb10f3817deb32adf190
-
Filesize
10KB
MD51506e1f5ad51d483d6d86a8a51e6cec5
SHA1bbdbed4b30bdaa2f73d8a8e2ee609fff3f8563ef
SHA25678f7e261e1f4fe99a9f02f8b9fcf7f804c8a8a1315aa55e04837b803fa80415c
SHA5125aeacd58c61bbb4b70493e7099e85c0101ba03a24d5cc69904c9e8f4e6ea0cdbc6b578b11518970184b49368259c393e39fe6015bd2b8ced56f65bcebdc23617