Analysis
-
max time kernel
138s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 03:57
Static task
static1
Behavioral task
behavioral1
Sample
15e02edefde6de56c8f45c1e2a12612b_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
15e02edefde6de56c8f45c1e2a12612b_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
15e02edefde6de56c8f45c1e2a12612b_JaffaCakes118.html
-
Size
75KB
-
MD5
15e02edefde6de56c8f45c1e2a12612b
-
SHA1
08490788e01c65f22326fc9efa651e14803851a3
-
SHA256
6efae6e7f5bb433661964bd2fea9be783655354b01aff37fb2296f26060619e1
-
SHA512
eefe10132ef9dcf82528008efd10a103b21aa28bcbef83203b9b1aed216a15f7da5030115a97d2cda786d2820d013d5ad2e4aaec4c7ea312a3f7413d3980b74a
-
SSDEEP
1536:SyNSWjvftir04x5dbQW1t8k9N/ha06rUSc824l2T0iD8L9ag4C0ZX3h7M:SyMWsr0u5dbx1t8aN/ZF024l2T0iD82o
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2700 msedge.exe 2700 msedge.exe 1884 msedge.exe 1884 msedge.exe 1864 identity_helper.exe 1864 identity_helper.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe 4620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1884 wrote to memory of 3580 1884 msedge.exe 85 PID 1884 wrote to memory of 3580 1884 msedge.exe 85 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 1992 1884 msedge.exe 86 PID 1884 wrote to memory of 2700 1884 msedge.exe 87 PID 1884 wrote to memory of 2700 1884 msedge.exe 87 PID 1884 wrote to memory of 2540 1884 msedge.exe 88 PID 1884 wrote to memory of 2540 1884 msedge.exe 88 PID 1884 wrote to memory of 2540 1884 msedge.exe 88 PID 1884 wrote to memory of 2540 1884 msedge.exe 88 PID 1884 wrote to memory of 2540 1884 msedge.exe 88 PID 1884 wrote to memory of 2540 1884 msedge.exe 88 PID 1884 wrote to memory of 2540 1884 msedge.exe 88 PID 1884 wrote to memory of 2540 1884 msedge.exe 88 PID 1884 wrote to memory of 2540 1884 msedge.exe 88 PID 1884 wrote to memory of 2540 1884 msedge.exe 88 PID 1884 wrote to memory of 2540 1884 msedge.exe 88 PID 1884 wrote to memory of 2540 1884 msedge.exe 88 PID 1884 wrote to memory of 2540 1884 msedge.exe 88 PID 1884 wrote to memory of 2540 1884 msedge.exe 88 PID 1884 wrote to memory of 2540 1884 msedge.exe 88 PID 1884 wrote to memory of 2540 1884 msedge.exe 88 PID 1884 wrote to memory of 2540 1884 msedge.exe 88 PID 1884 wrote to memory of 2540 1884 msedge.exe 88 PID 1884 wrote to memory of 2540 1884 msedge.exe 88 PID 1884 wrote to memory of 2540 1884 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\15e02edefde6de56c8f45c1e2a12612b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff7bd746f8,0x7fff7bd74708,0x7fff7bd747182⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,1428519861499667883,15250044862835956232,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,1428519861499667883,15250044862835956232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,1428519861499667883,15250044862835956232,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1428519861499667883,15250044862835956232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1428519861499667883,15250044862835956232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1428519861499667883,15250044862835956232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1428519861499667883,15250044862835956232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1428519861499667883,15250044862835956232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,1428519861499667883,15250044862835956232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:82⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,1428519861499667883,15250044862835956232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1428519861499667883,15250044862835956232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1428519861499667883,15250044862835956232,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1428519861499667883,15250044862835956232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1428519861499667883,15250044862835956232,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,1428519861499667883,15250044862835956232,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5368 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD545d8010940a9a000ccb0356e4d93bb0a
SHA185537af629a95dbe31273ad86e4f94b3bdb4b976
SHA2561ef66baa6d8ca8bf1eb9e0f685ac1a719dfcc59f2cc8e2fb595298c747a57d08
SHA512916d31e38c0e2e57681ee307fd2f0bfe75a263e72161783ce872b8d899f0c5141e9f995f858769638e46145cce5260d7a6ad50a0d4466441d392e6308f4ae5bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD51e13cac05ee42b17a3b5bcb3dc5cb55a
SHA11dcdec4be150576da989beed1a857bfa63aacc84
SHA2560eac68c27b1b544ed503e3265afc769dbaae2dc13cc48fd4e74a29884545d008
SHA512f1b058dd630f43196ecc8f6a24fe3e425a1769e29b06e9ec02d79386ad37f04df147369c3fd3d529b0cf61c3cfeb385c9abedb02abf8cde3bae0a07f94d05d84
-
Filesize
1KB
MD556a33e4ab719094bde84353f33089341
SHA1fe72be8579c7dbd2d111f10ec6b0fbb707deba6d
SHA2562bfa54cf5437ad1bc6226a9005ec6748c12efb2dbd52d353830e35b2c50169b1
SHA51282cb000dffea351fcd434803ceacecdae3c42184ca7ff67ba18014411aa4205ce8efb253e8bf156967529173c78c19359cacf74769b9860182d86d9ffcdc227b
-
Filesize
5KB
MD5ac8c89b5394d33d58f3b7b8ef0f244eb
SHA14eb09a507f246c7f66f081f8fdcbf91b75ff05f2
SHA256a7561556c9362085183edc1f6669e19882f5988cd55299d978a6268d35e84a4e
SHA512882b626b33ccfe99801bf59a97b16f78718a9dfbd5bdc8812e92f14e49e9e08c788e544a7329068b08cba56046688c00861614bb07b0fce44bc4bbf728fe67cc
-
Filesize
7KB
MD506bb8a6fab175e8aa775476c9b9f21e5
SHA17140a674cc93272b77384c5ed0ffb86bca37cb85
SHA25607fc00d638fe0246de6b1cb2e749cffb32a5a9df71a174713163d80747d5250a
SHA512cd70aa062c5391eb5f238c97a607e60d34036d1e00fc7c6dd451895903a8ddc688e3359ce5b2702813e4195cf621e85978b93bee1ce25d6b32c7da3953230b0a
-
Filesize
6KB
MD534644280c4141d602d1e49e8b55a4527
SHA177d9eb3154e211f5fdeed0e280c928f046da748d
SHA256dca08b8079d8bfdaf5e2bc0f420ac7fb26197ee7e66fdb39a11e1951a628a020
SHA51223187d1f091f6ba1f1f62b8d9b0919bf8cfa83f122e5730a3ff909bd2007e76c715c2c63c98a099e0c01c271d536f31aa582d31f7843f3b81bee478c3b9425d9
-
Filesize
6KB
MD56d8109316f3935fa11a36f3ce13c408e
SHA1bdd81840d1e17a1646dd535a598d2d402ada921f
SHA256298b910053dce495a601193690f9101ef866130536beb8c1fc1d7c3fff677fa4
SHA512a9c485a6dccb6ec3fef611a8befeaca77050289d9854381b3264e45f6a8f3c8109822da7dc1c39764412518cd900b01617646601865edfe568d18938473d5c50
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD586a4a767220a2eae1db3c3f0d01b2937
SHA1406714dd067ad270e35cbf4f60a8720d0161cc42
SHA25659569652e1135261ca31ba23815ad490c7f068074d98e532c3b4144188dcddb3
SHA512ba48ae4ad3ddcdd07373ee9cb2fb285d46316b75221ba40141baf10933deed293a913e8962ab63e3d4928709095b77185a3b21eed41de793bffc5e18f73e4709