Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 07:52
Static task
static1
Behavioral task
behavioral1
Sample
3ea9805a4dfd2ae328927f1c29ba8c6c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ea9805a4dfd2ae328927f1c29ba8c6c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3ea9805a4dfd2ae328927f1c29ba8c6c_JaffaCakes118.html
-
Size
93KB
-
MD5
3ea9805a4dfd2ae328927f1c29ba8c6c
-
SHA1
c4383c5371fca1b1e8ac3f5d3a9ad204bdb75f7d
-
SHA256
802336c35fc72a50fab6e36c42867192fe4d15d6bdfa39cfc6dd29cab525a9f4
-
SHA512
49c9136e8971f63ec21143c80aaf686660fed6f1ad41e3e42a41381908743ce671fbdb03b9c9ebc0abad61110cb5395b28d4792ba28595399a9bb95f4e1f7e2d
-
SSDEEP
1536:miOyfMwvmT+dmdHqUEgVl7uWGAGxrxBke03QZqwxrg1LoT+telulKw:mbykaK+dmdHqal6Xhx8QXxrg1LoiIluh
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2904 msedge.exe 2904 msedge.exe 3300 msedge.exe 3300 msedge.exe 4688 identity_helper.exe 4688 identity_helper.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3300 wrote to memory of 4244 3300 msedge.exe 83 PID 3300 wrote to memory of 4244 3300 msedge.exe 83 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 4464 3300 msedge.exe 84 PID 3300 wrote to memory of 2904 3300 msedge.exe 85 PID 3300 wrote to memory of 2904 3300 msedge.exe 85 PID 3300 wrote to memory of 4656 3300 msedge.exe 86 PID 3300 wrote to memory of 4656 3300 msedge.exe 86 PID 3300 wrote to memory of 4656 3300 msedge.exe 86 PID 3300 wrote to memory of 4656 3300 msedge.exe 86 PID 3300 wrote to memory of 4656 3300 msedge.exe 86 PID 3300 wrote to memory of 4656 3300 msedge.exe 86 PID 3300 wrote to memory of 4656 3300 msedge.exe 86 PID 3300 wrote to memory of 4656 3300 msedge.exe 86 PID 3300 wrote to memory of 4656 3300 msedge.exe 86 PID 3300 wrote to memory of 4656 3300 msedge.exe 86 PID 3300 wrote to memory of 4656 3300 msedge.exe 86 PID 3300 wrote to memory of 4656 3300 msedge.exe 86 PID 3300 wrote to memory of 4656 3300 msedge.exe 86 PID 3300 wrote to memory of 4656 3300 msedge.exe 86 PID 3300 wrote to memory of 4656 3300 msedge.exe 86 PID 3300 wrote to memory of 4656 3300 msedge.exe 86 PID 3300 wrote to memory of 4656 3300 msedge.exe 86 PID 3300 wrote to memory of 4656 3300 msedge.exe 86 PID 3300 wrote to memory of 4656 3300 msedge.exe 86 PID 3300 wrote to memory of 4656 3300 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3ea9805a4dfd2ae328927f1c29ba8c6c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff409f46f8,0x7fff409f4708,0x7fff409f47182⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15374357413418366915,8597068194171951624,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,15374357413418366915,8597068194171951624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,15374357413418366915,8597068194171951624,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15374357413418366915,8597068194171951624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15374357413418366915,8597068194171951624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15374357413418366915,8597068194171951624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15374357413418366915,8597068194171951624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15374357413418366915,8597068194171951624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,15374357413418366915,8597068194171951624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3940 /prefetch:82⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,15374357413418366915,8597068194171951624,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15374357413418366915,8597068194171951624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15374357413418366915,8597068194171951624,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15374357413418366915,8597068194171951624,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15374357413418366915,8597068194171951624,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15374357413418366915,8597068194171951624,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5b22f6f3819f460b8823e97708c0677c4
SHA12dc8861851229ba68301112d2870fc185e4338ce
SHA2565b7c076d1de54ee3e6a98a66592040cc33658964bf4322d2e69019d1be5df9e6
SHA512b340e5794d171ee7b1a20e6392f7e888e2b36db7db08a26c614f69f1da72c0f77c0ab12f4f030b1ba336bb66b5d8cba586b02ed8439da37553214abc896f6c66
-
Filesize
1KB
MD5dfad37a78a4cafc8fa8f9b36ea0614ba
SHA166e0e9f824041bd0901bee02d8da0506f56476d1
SHA25624b4327802d34e76d1674b581dccbd5a97adbed92dc816888480fa10ffa4f4d6
SHA512f6eff51f9729d77d22ff09c5049f69345dbf892cb0644796f787b014798afc0a277387f3c7b5409701f06e6dad51fedcaeb00e6bea40e4d00605edf1523e5478
-
Filesize
1KB
MD5595b3fd9f6277e150f631737ff3fea10
SHA1253354948f2075a5a6534fa20d4cf13fbd4f053f
SHA256ec5ef8af2aca5c9d20d90b021ca5921809f0f8c3d2a53892f3843fc8e0a36eeb
SHA5120c49bf599e43e4375539914e9bdb7c40075e79d3723a2349a7c79abfd1b354dfdf817421e303f78ec7ce4c5e45b2f721a62a3167807c9654dd58722b773c0e7c
-
Filesize
6KB
MD554ae697df9c4ca5015bd3fb51e8c5ed3
SHA1b963f9844487e80c4b1d1c2855eed605bb8676e0
SHA2561dd5278e2c30a3f93dd88468c4100d14d81ad41699b8aa666725ebd50b1c465b
SHA512fec31fdd883c4d25f6122b83b8db7149e18fe5f81814c0592cf22252cc5f42e43da1731c9a10b7fe1cd4e97196f5def0645cb2cda724b2182981001f316e923d
-
Filesize
7KB
MD5bd1ff645e52d0b30292aa8738ef4818b
SHA1278d0df5afaea8250635fd2a41f50f948e496c25
SHA256e67a50a88ef5bec497a7f28bb5cdc213de4b45941215a9411bdbde1e40e6f969
SHA5126e04d6af32686866bb3decb1db7d85fa9769421d7411ec4439a85a58f342c650d724484dc71de8d2c5ce96b9f6c0456511364cdc4b4e551cf49e10d592e6f32a
-
Filesize
6KB
MD5c1b1e99402805c5c686d783ad7723812
SHA1986e01d352177ef1b5ed440fd301678926dec6f2
SHA2563b555b92790a5132a518525ac245e9ad3b384f04facccc348e33ba00a6220b75
SHA5124c4d9c10eb0f92a590dde997e66c59149a3c5da6eabd8751ceecc21980ff27994f43fe80256a09c743ee10404f5d5a3b80542ec72c0a76d16ec0e287e44d7b3c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD542934298d40c5ae7ac5d743229ca4f33
SHA19b956258b1268c85ed1f80d7e5fc88926bce36ff
SHA2563be59e8bde4dbb8d86c894adcf6779e27c2593e372a86a275712e0bc51fcb821
SHA5129898c79eafe3ae326163c86be59ced01a645271f4e45deb9069ec8895e8802adf6784de41930151bb7a4b131b128aef2e7cc58f0edd082fa4cc0745248c1f649