Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
fc00bb4ba6b9b0fa2c12105024de65c0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fc00bb4ba6b9b0fa2c12105024de65c0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc00bb4ba6b9b0fa2c12105024de65c0_JaffaCakes118.html
-
Size
62KB
-
MD5
fc00bb4ba6b9b0fa2c12105024de65c0
-
SHA1
4771649ee3873f99376d9e6e752679e0bfdd0b0b
-
SHA256
53eb2d7de31cf58c8091692da635e1d0c57fffa72775c54c14f8d8a3e9cb1d29
-
SHA512
9acd35eb46aac18be494e0c48a21518d3497280ae563bc41f2a96a825c8404f3e07337a60bd0957e4bd99fac189521a6fbe90960ea25b327e3fc1a02ccc12868
-
SSDEEP
1536:t5013FEHHMMzZdn94pCqcQc6zkQ9D7S17SJT2zq27kzeIX:a3WHsCfnbQ0SD7S17SJT2zb72X
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4576 msedge.exe 4576 msedge.exe 4424 msedge.exe 4424 msedge.exe 1432 identity_helper.exe 1432 identity_helper.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4424 wrote to memory of 4560 4424 msedge.exe 82 PID 4424 wrote to memory of 4560 4424 msedge.exe 82 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 3748 4424 msedge.exe 83 PID 4424 wrote to memory of 4576 4424 msedge.exe 84 PID 4424 wrote to memory of 4576 4424 msedge.exe 84 PID 4424 wrote to memory of 2356 4424 msedge.exe 85 PID 4424 wrote to memory of 2356 4424 msedge.exe 85 PID 4424 wrote to memory of 2356 4424 msedge.exe 85 PID 4424 wrote to memory of 2356 4424 msedge.exe 85 PID 4424 wrote to memory of 2356 4424 msedge.exe 85 PID 4424 wrote to memory of 2356 4424 msedge.exe 85 PID 4424 wrote to memory of 2356 4424 msedge.exe 85 PID 4424 wrote to memory of 2356 4424 msedge.exe 85 PID 4424 wrote to memory of 2356 4424 msedge.exe 85 PID 4424 wrote to memory of 2356 4424 msedge.exe 85 PID 4424 wrote to memory of 2356 4424 msedge.exe 85 PID 4424 wrote to memory of 2356 4424 msedge.exe 85 PID 4424 wrote to memory of 2356 4424 msedge.exe 85 PID 4424 wrote to memory of 2356 4424 msedge.exe 85 PID 4424 wrote to memory of 2356 4424 msedge.exe 85 PID 4424 wrote to memory of 2356 4424 msedge.exe 85 PID 4424 wrote to memory of 2356 4424 msedge.exe 85 PID 4424 wrote to memory of 2356 4424 msedge.exe 85 PID 4424 wrote to memory of 2356 4424 msedge.exe 85 PID 4424 wrote to memory of 2356 4424 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fc00bb4ba6b9b0fa2c12105024de65c0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc9f5746f8,0x7ffc9f574708,0x7ffc9f5747182⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,1076901977574500805,3561091075456655568,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,1076901977574500805,3561091075456655568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,1076901977574500805,3561091075456655568,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1076901977574500805,3561091075456655568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1076901977574500805,3561091075456655568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1076901977574500805,3561091075456655568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1076901977574500805,3561091075456655568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,1076901977574500805,3561091075456655568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6100 /prefetch:82⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,1076901977574500805,3561091075456655568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1076901977574500805,3561091075456655568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1076901977574500805,3561091075456655568,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1076901977574500805,3561091075456655568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1076901977574500805,3561091075456655568,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,1076901977574500805,3561091075456655568,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5288 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1888
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
23KB
MD5c897f8479da25ec570027594f1b4db24
SHA181a3ff06cf35a87e697fc4733966dffc270ad06b
SHA2567fd05e325904c9c31e435d5c65b9b4ffa11a9116d1df0282d6cd7c87ef6f1dbc
SHA512b1c1c46810c3bc5c407f7d30a9d74db8242860965d958ffc5bfeed35b1204774843775ae81b8c414ea89322d00d7ab97313965e20cebba588edf13b9b8dcbc10
-
Filesize
45KB
MD5ede70f717200a59b4cb831635de913a1
SHA1d4d6e893ac192b5df087e924ab3356852f8a7bc0
SHA256c63fbcc69de230e4844cf735ccf668eeaf30e42126eeb464da39c2de6b0b0051
SHA512b621bde28b90ba97c122677989d994cb5e88fd0906366af1a23ad3f9d9f3b7f2bbef95873f29100433d4068fbbf7ab798505e68deefc118097fc5f76dfc4b672
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5bc40be46ebc89cd6978baffcfa298385
SHA1fb384115984392a03b10f5bda2b58324208db5f8
SHA256532d037b9bcc8f6867575dcc3fee2044e46b7b352ac16dadbbdd755d98660d9d
SHA512c163d2bf3bdc58cb2ac3bf80d7350cf838f49eeaa229197f8532a6559ffed6c1bddbb5ce53aaaa05079732e2b49cd3b8925751ae3dd7eb2353ef4006e200177f
-
Filesize
1KB
MD574030304fbb6ebdd93f77561a8b8d042
SHA1d74ac16a97f3e0fa925f5124fbe5bff893ea8b83
SHA2566215de98ef4209551768a94f5de67537be3103278d026a9f9c8418ad5710e818
SHA5127af7c8ad0748c916b13f5fec3ab5063cf7cb8d661244311e1cc1d2aa082220b9ec4752f63e4dcbe5b3b808b45ce6c8a136c99fb66528546c9078e396c14da456
-
Filesize
1KB
MD51f4b1540e790c7bb69dd95dda17a388a
SHA164cdad4ed09fa8336b36b6b0dcfff5078a389408
SHA2566489fd47b469ad99f73b3e9838c512c57bde7d9440da5055e3877df17bb92937
SHA5126d6c766a0090d4412f3c58788f1e6142a7b7efd978d4730a4a8389d3e3892fd333021094f59707d3f0a18c775f40f67663ef589ebeeeada8c25165324ba94bfd
-
Filesize
7KB
MD5de22a3b07e8c5943f9026a2b894a3f1e
SHA1c5aefb81ea31e4cd5799361a1663998fe21514b1
SHA2562b022faf723f663adde0e9bae8acb3a749833545a2c50dd210a71397fce0ce27
SHA51235a20586e82ece2637e401d757a15274ad093fdf9734a9250b51a3dc704cfb45dd2aa6fe285944275b2c852346668901d3c78e1d3de7c0105f5fd31d960ee67b
-
Filesize
5KB
MD5cadb3d9b6d26ac3f166b6eef27340bc6
SHA1ca8d91ec9b273bd05c9097abe12855550807caaf
SHA2560f36d6afdda23d355ded5cdf5a6b4ff5fbe3cf4d6cb805b54ebdb0d2d75df7be
SHA512d9a5d4811704fbb99d4b808f17a7a9456b217cc095f79c77ad925ce6e0dfd1de51ed252d1a255adb78626e9b70fb39c25b79db91924c799cf59d0627f9345aa6
-
Filesize
7KB
MD5e522556aa2fec516684a37d32f1a512c
SHA1bace72409cb201de2c6fc6a2678b696651e6292c
SHA256d3485673415d4d254b40babd0a8a69a113e27ff2fb565621d5cbc72634403a4b
SHA5123c34ec91ec47a10f3d85039c8b630f3e1afb2fb0c6f746043243722bfe872887912fd22275fc5c52a390418b048a07841ee4872fa89a2421548a4b432bf99b0d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5991f39be40382fa3f5dbe7c9415449f9
SHA1a28e853d161a65e11c605cdf8a98e0851b337bb2
SHA25684537c583ab4f653da006442c4b3e31bb426a06c11586b4c4509fbb7ec3c5da0
SHA51233f69fb472d8529577f7d455ab4c0a4895b73adb906f3a11b4aabb09601e6b153ea63ab6082b0e63a6d8a6daa606a14681922bea2231d821be7baab100ba8592