Analysis
-
max time kernel
144s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 04:02
Static task
static1
Behavioral task
behavioral1
Sample
15e40f360ca9a468e0a016f0eafdec65_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15e40f360ca9a468e0a016f0eafdec65_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
15e40f360ca9a468e0a016f0eafdec65_JaffaCakes118.html
-
Size
143KB
-
MD5
15e40f360ca9a468e0a016f0eafdec65
-
SHA1
ad4d91f5b88ee446f1d228c37cb4f5ed14048f5a
-
SHA256
dee5b552a4f9b8de4d004b278403f331bd2e94c4af37509d78ef13408505aeb6
-
SHA512
98e6a9d5fb6472c2e207f0b7d477449ccc916a33cba127167cd1737b078b9a8c7b14729dea6f3810f99e369dbb1ace8cce419cb9e827c23733355215eb620e63
-
SSDEEP
3072:bHBcC9RJcspiL8+WBfTIVM6ag/BdG4f7pt8aN2okVaAlu/AHx/J5r1Ltd2:bHBD9npiL8+WBfTIVM6ag/BdG4f7pt8q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4504 msedge.exe 4504 msedge.exe 2648 msedge.exe 2648 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 3680 identity_helper.exe 3680 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2648 wrote to memory of 4900 2648 msedge.exe 84 PID 2648 wrote to memory of 4900 2648 msedge.exe 84 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4116 2648 msedge.exe 85 PID 2648 wrote to memory of 4504 2648 msedge.exe 86 PID 2648 wrote to memory of 4504 2648 msedge.exe 86 PID 2648 wrote to memory of 4248 2648 msedge.exe 87 PID 2648 wrote to memory of 4248 2648 msedge.exe 87 PID 2648 wrote to memory of 4248 2648 msedge.exe 87 PID 2648 wrote to memory of 4248 2648 msedge.exe 87 PID 2648 wrote to memory of 4248 2648 msedge.exe 87 PID 2648 wrote to memory of 4248 2648 msedge.exe 87 PID 2648 wrote to memory of 4248 2648 msedge.exe 87 PID 2648 wrote to memory of 4248 2648 msedge.exe 87 PID 2648 wrote to memory of 4248 2648 msedge.exe 87 PID 2648 wrote to memory of 4248 2648 msedge.exe 87 PID 2648 wrote to memory of 4248 2648 msedge.exe 87 PID 2648 wrote to memory of 4248 2648 msedge.exe 87 PID 2648 wrote to memory of 4248 2648 msedge.exe 87 PID 2648 wrote to memory of 4248 2648 msedge.exe 87 PID 2648 wrote to memory of 4248 2648 msedge.exe 87 PID 2648 wrote to memory of 4248 2648 msedge.exe 87 PID 2648 wrote to memory of 4248 2648 msedge.exe 87 PID 2648 wrote to memory of 4248 2648 msedge.exe 87 PID 2648 wrote to memory of 4248 2648 msedge.exe 87 PID 2648 wrote to memory of 4248 2648 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\15e40f360ca9a468e0a016f0eafdec65_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb3c346f8,0x7ffcb3c34708,0x7ffcb3c347182⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,15631781532202698280,3509180849985979328,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,15631781532202698280,3509180849985979328,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,15631781532202698280,3509180849985979328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15631781532202698280,3509180849985979328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15631781532202698280,3509180849985979328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15631781532202698280,3509180849985979328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15631781532202698280,3509180849985979328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,15631781532202698280,3509180849985979328,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15631781532202698280,3509180849985979328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1688 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15631781532202698280,3509180849985979328,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1708 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,15631781532202698280,3509180849985979328,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 /prefetch:82⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,15631781532202698280,3509180849985979328,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15631781532202698280,3509180849985979328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15631781532202698280,3509180849985979328,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:2676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3260
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD572bc0dc545f6ab408f855b3ba1037cbf
SHA1fb81aaac85f7218a8a3871c8551bbf437d62b5b4
SHA2564df04ab70e436ea92b94ee87c80ccba527340541abada9e93bbc9d16ac8d5e04
SHA512b116642c05d1ce9042a65c0cafcb2760e5bcd8e54ad122c459f6713f8247b30b984c134f40075fd7cc6353133e738ec52bd4ca464708b588e4b7f99f36a1bc7b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD589991bc2e77b77663b72e055a4e466f0
SHA1477fb2374567bac32f94e968e13872b5bf152467
SHA256c9088937367f354d9381721cc8418febd7f36a7547b51a9a007e8084241b8004
SHA51274ae0a2f017069e072e37502f1f1c55d1c4cf3a1037978bc288b58326633e85e60ec673d2bd197f59cf1fe86804c56d9db6db9653617f531a5c5a2872696de4e
-
Filesize
2KB
MD5ee7971861f155be2b4e34449d7d7ff7b
SHA1110b532f3d3218d97d6079fe89795e04473a131f
SHA2567c7d9fef8fe02c4455ac4dda5333e95ca2293e6e924f2c310ffcd753427f9a6d
SHA512a090ee0efd0778ce51250d942056fa144fecb11bcede4bcdee9238036934094733c4fc0a7177f376b2d340a3183ac083a4ddfb7bfeff618d1b6342f08afbf26e
-
Filesize
5KB
MD5432b667d3e0eca9d0b1acc83aecef8e0
SHA1a7259792eb98f9255094564c3dd006b6c37d4316
SHA2563d4a14d34660ab54954360eb78202d1d3511e34dc36489d9d932cd7d941b6111
SHA512d8432cb02cb56c2a8e242a4788e14dcda67f07536afee8aaddf74eefb3d1967b02706cc6e8244ace080a00788b99945422a3d4b37f4a2b5eaf829b77444c72dd
-
Filesize
7KB
MD5a738e1fd65506b3d8e3538754b05f8b8
SHA15fbe35096b478aa98979863de1f1257078e9a4d9
SHA256649da2ef86ee8dcfb6c8de4e08e7227490f4988a0e59e1d8a5ac297de191a593
SHA5123e9bdca4f1b1ee8f7f2379bb91250e057ab1979cbc59500bc2b977417d4f2ef44904ad87ae126a8eb83f2e2a6d8552b9106977d8e81120d8b37d0c1eea9edd6d
-
Filesize
7KB
MD5bd31f435c6a2c6d0d7737870666c1d05
SHA10d428e7279497bbe85c579337d1a097821102884
SHA256be4fb12464d0ecf766ed1e4ed4b6253e1ae5a08a9ad9cf080be933113c0bd628
SHA512ebf78f921917cfbfe194e21c34ca9fd25682f7c800d0b58e31f75b16fb43dc9bb5e8f3343bf593362fce6615ece802a52378042dca2fb1b4f0293c9f8f76810d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d9f73429a4cc65e26a120f70e294cac0
SHA144c7b0da7b485a82507a4e7f397fbe8e62686b20
SHA256fb99dc89da6934572a0e3ea40c3fe4624b3688c0310bfe8369d7a234cdebb81f
SHA512d8eb3d624f1cca3bd578d67ef311d6f91eee75bf9a9597a5725816267728412bbefc8262d0fadc47a6d841321977cac765a22602de7e28b37f15f1a9fefc7863