Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
54c110f3c877a441b55ba209f1e8b86d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54c110f3c877a441b55ba209f1e8b86d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
54c110f3c877a441b55ba209f1e8b86d_JaffaCakes118.html
-
Size
57KB
-
MD5
54c110f3c877a441b55ba209f1e8b86d
-
SHA1
81ab62c81f2f19f5766681e7c722132af3bd7326
-
SHA256
b3d0e60b76d368d3b7ac9e83b293dd815e9c4293855456c1d6b81ba7260cb22b
-
SHA512
9e2496cb62370334a26219ad7e0d6f525191076755c357588543c7e06b5a077adc0d44a7863b7be5c37f585180dc95474aede1a8fb8929e94b591edb754aa430
-
SSDEEP
1536:ijEQvK8OPHdsAuo2vgyHJv0owbd6zKD6CDK2RVroRtwpDK2RVy:ijnOPHds22vgyHJutDK2RVroRtwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3808 msedge.exe 3808 msedge.exe 436 msedge.exe 436 msedge.exe 32 identity_helper.exe 32 identity_helper.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 436 wrote to memory of 1616 436 msedge.exe 84 PID 436 wrote to memory of 1616 436 msedge.exe 84 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 2684 436 msedge.exe 85 PID 436 wrote to memory of 3808 436 msedge.exe 86 PID 436 wrote to memory of 3808 436 msedge.exe 86 PID 436 wrote to memory of 3900 436 msedge.exe 87 PID 436 wrote to memory of 3900 436 msedge.exe 87 PID 436 wrote to memory of 3900 436 msedge.exe 87 PID 436 wrote to memory of 3900 436 msedge.exe 87 PID 436 wrote to memory of 3900 436 msedge.exe 87 PID 436 wrote to memory of 3900 436 msedge.exe 87 PID 436 wrote to memory of 3900 436 msedge.exe 87 PID 436 wrote to memory of 3900 436 msedge.exe 87 PID 436 wrote to memory of 3900 436 msedge.exe 87 PID 436 wrote to memory of 3900 436 msedge.exe 87 PID 436 wrote to memory of 3900 436 msedge.exe 87 PID 436 wrote to memory of 3900 436 msedge.exe 87 PID 436 wrote to memory of 3900 436 msedge.exe 87 PID 436 wrote to memory of 3900 436 msedge.exe 87 PID 436 wrote to memory of 3900 436 msedge.exe 87 PID 436 wrote to memory of 3900 436 msedge.exe 87 PID 436 wrote to memory of 3900 436 msedge.exe 87 PID 436 wrote to memory of 3900 436 msedge.exe 87 PID 436 wrote to memory of 3900 436 msedge.exe 87 PID 436 wrote to memory of 3900 436 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\54c110f3c877a441b55ba209f1e8b86d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff276546f8,0x7fff27654708,0x7fff276547182⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,7151523174726353597,16782814725855628287,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,7151523174726353597,16782814725855628287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,7151523174726353597,16782814725855628287,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7151523174726353597,16782814725855628287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7151523174726353597,16782814725855628287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7151523174726353597,16782814725855628287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7151523174726353597,16782814725855628287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7151523174726353597,16782814725855628287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7151523174726353597,16782814725855628287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7151523174726353597,16782814725855628287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7151523174726353597,16782814725855628287,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,7151523174726353597,16782814725855628287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6656 /prefetch:82⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,7151523174726353597,16782814725855628287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6656 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7151523174726353597,16782814725855628287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7151523174726353597,16782814725855628287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,7151523174726353597,16782814725855628287,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:5196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,7151523174726353597,16782814725855628287,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD53630a15f74b9b2b55f1ae072c256b6ff
SHA154357f58c30817f9139a735b5b6d9c85507be28d
SHA2563704df6457f3cf6b5ed16916becd338a869d41efd8fe99b1ff63e7216fe0450d
SHA512b08ce4a446742376694126ea7eb8e7d09d093b49d523ae409a86d59c0f5c773027530cd2e17c07ae61d58d1c425cf9198676ed55d4fa5bee1ed1663350350916
-
Filesize
2KB
MD59f2899acd6e7bd53c3c07ae462f76937
SHA1fd629cde6d70a8ca6089da190a4b5c9e9b8a480e
SHA256db5f92a24a3c8c5204226fe2cbe6a3a83a442945fdf60dc68f0ede40ed8077ef
SHA5123a7b405322e2e94056390241c7b380cf211b875a3e3c2ca7781f4ae7936b31e8c149a912ad520a386ea3408e6ad7d5f13ab741dbafd86d8244261099d96c1d5b
-
Filesize
5KB
MD503e8556a4e4cc430e9b82e0df1860763
SHA180d7af6fd0c61e38218aee1426d9af886c0b1bd4
SHA256b273d3261dbf7c256bc653ae376d24eb13d2e76e97cba0b863778db13f998618
SHA5125d203791aeccb5b6d7a8542fa67fbc67e451f401830b7718c2796de4b00996ff344dacbfb1d282cc5d30eb63e4c6d4de50d2b641bf0a7102ac4a96ac6f3a5c6e
-
Filesize
6KB
MD5f34e49880a753fab907b714115ffae2f
SHA15ce61716797d68f80dbd5774a1738a370e87e685
SHA256687326059e7a51f10ed502f118ec68cc19052acd0c34330746ca98abb908767d
SHA512164c9ea30fc0a5723ee057c118341b3a0217d138081277ea5f78e495b6d6595b344a40fb55278d1f6274b88f9b2c522346eac9edcd516ddd80ba8deb9fb2a2b5
-
Filesize
6KB
MD5a393ad39529b4abc9a6af5ec24453664
SHA1f6dc7c313230735c7d370be47b3da1eb98b0e1f0
SHA2562d0a22ff6a4f5d3051075af95b2d85864ac1d344b18736b467cbef2a21473640
SHA51217a813ffcb8db1cffb2ff189fdd9ededc94debab2fbc79c8e38111b59cf3dee821846b28151b323927eb71effacf7ed05d716d36adae11a4ee32f895f6b4f21e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD58baaecfb355e971805c54a07afa2fe8f
SHA1464a3788767487db35fc40b5009bac9030e9c4ce
SHA2567268a2667f896ccbc4370f458255f7cdc6ca9b006104b23ec6315ae6399218d6
SHA512e6d1bea3613b5459dd57bbc4523d2a9a5d99425d6181c2e6ac3c0dfd65a47172a9f7fac0e4327ed03ff70bb7474cf81ae19a6c3a8b09f5241fff30eea436259f