Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
89a10b15dddba11dbed916247d617ab2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
89a10b15dddba11dbed916247d617ab2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
89a10b15dddba11dbed916247d617ab2_JaffaCakes118.html
-
Size
207KB
-
MD5
89a10b15dddba11dbed916247d617ab2
-
SHA1
34c12656ce58a33204f01f8e14768bbf059df2f1
-
SHA256
7b0957334027ba1c217f1fc220452b3240f2eb79c6a87a1a245981f9f79aa7fc
-
SHA512
2881dd06b570e01a3296f50c2a399c6cc27c5b387983fce729f1d12b127af2f9c744358b67804d9e958126d8b358350330383e60e76b583aaf69ff70ccfaa877
-
SSDEEP
3072:IkclhxfHUaJ3UIl738PXyny540Z3pUR2WUEJ0:IkclgaJ3UIl738P5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1468 msedge.exe 1468 msedge.exe 4868 msedge.exe 4868 msedge.exe 956 identity_helper.exe 956 identity_helper.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4868 wrote to memory of 2236 4868 msedge.exe 81 PID 4868 wrote to memory of 2236 4868 msedge.exe 81 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 4480 4868 msedge.exe 82 PID 4868 wrote to memory of 1468 4868 msedge.exe 83 PID 4868 wrote to memory of 1468 4868 msedge.exe 83 PID 4868 wrote to memory of 4676 4868 msedge.exe 84 PID 4868 wrote to memory of 4676 4868 msedge.exe 84 PID 4868 wrote to memory of 4676 4868 msedge.exe 84 PID 4868 wrote to memory of 4676 4868 msedge.exe 84 PID 4868 wrote to memory of 4676 4868 msedge.exe 84 PID 4868 wrote to memory of 4676 4868 msedge.exe 84 PID 4868 wrote to memory of 4676 4868 msedge.exe 84 PID 4868 wrote to memory of 4676 4868 msedge.exe 84 PID 4868 wrote to memory of 4676 4868 msedge.exe 84 PID 4868 wrote to memory of 4676 4868 msedge.exe 84 PID 4868 wrote to memory of 4676 4868 msedge.exe 84 PID 4868 wrote to memory of 4676 4868 msedge.exe 84 PID 4868 wrote to memory of 4676 4868 msedge.exe 84 PID 4868 wrote to memory of 4676 4868 msedge.exe 84 PID 4868 wrote to memory of 4676 4868 msedge.exe 84 PID 4868 wrote to memory of 4676 4868 msedge.exe 84 PID 4868 wrote to memory of 4676 4868 msedge.exe 84 PID 4868 wrote to memory of 4676 4868 msedge.exe 84 PID 4868 wrote to memory of 4676 4868 msedge.exe 84 PID 4868 wrote to memory of 4676 4868 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\89a10b15dddba11dbed916247d617ab2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa26ce46f8,0x7ffa26ce4708,0x7ffa26ce47182⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,12153238175839204300,17377111968244335102,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,12153238175839204300,17377111968244335102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,12153238175839204300,17377111968244335102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12153238175839204300,17377111968244335102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12153238175839204300,17377111968244335102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12153238175839204300,17377111968244335102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12153238175839204300,17377111968244335102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12153238175839204300,17377111968244335102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12153238175839204300,17377111968244335102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,12153238175839204300,17377111968244335102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6180 /prefetch:82⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,12153238175839204300,17377111968244335102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12153238175839204300,17377111968244335102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12153238175839204300,17377111968244335102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12153238175839204300,17377111968244335102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12153238175839204300,17377111968244335102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,12153238175839204300,17377111968244335102,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD540655ded33b704fdb70ddfceeff58183
SHA106986ea77c89bde8733fe0c4e4d5a26096f31d6b
SHA2560f2dbaf95cf0f419f0d91981c12a0fe22b3613ed059e64d5b793730741ad04e3
SHA5124c1720b8efcd48deb144a7f4760e94de538de4929de676a563666fdd4352de6d97f51183044a571017ea1b20e871b3c9f6e0a9c37209b594e670623350a29e20
-
Filesize
2KB
MD5d08a09785472028e52809c593a434bae
SHA1ff5925d8da7c06837947ea9138b231e1f3dfa567
SHA256a65f988372fe50990f21277b167bdb55473edb0f46177d36fb00f2bee19a41dc
SHA512ceb1b0757a0ea1ad7242cb2dd66dbdc57215cb2b9dc08a7029e1f49fe665ef2eaec1e1309906c070a984be1088f05463b8c421fad955ebd5ee2dfd431b2b9e26
-
Filesize
2KB
MD55216cc42fa64691d26d1921ada9d06bd
SHA1594ae15d4dfbb1a3aeab4f3ed9c7b9134843c7c5
SHA2561e89415574ccb00c3754ba5aa551b0e9805d892404b524b8c688f7bef28931b7
SHA5120c995c44931445c11707f8bee4ff11433e85ac2626c6a8198c82a75ec9bb9df8e6c640fa35a3000a98ae70b679d933ffb4f25f3bd26ad78a0a5f6484b13608aa
-
Filesize
5KB
MD5e884fc22d4348e1ff5f26ee8678f8d2c
SHA107d9550466f7465d13ee8210846aad049908a9e8
SHA256154142279d3890d205f1fa52a3ac25c45d33dc889171c1332c4df454e54928b7
SHA5120f0afb9fee2ad7656463733ef55441e1b6a6d4e6a48c8b2a110a0a5db49f7d50380f1dc3684d643a4a3f82e14250f20578fb717f4a405ed771a40d8e77d25e68
-
Filesize
7KB
MD5faac86bab9ed4b6615a807f43dc27367
SHA171188d7e6e47b890600b76eb56d049917bbef803
SHA256b2e9fb3bf2fcadd65e49d03cb9740e13406cbed52b7daeaf9cdcc980a8548c5f
SHA5129774d52fbb758b7ca6b19d419c7bd3dc547624c7c82f12d7fb75fafd2e07becd50d9fd892041425374848a591c931a94b44bdf3c33fc2768566d8cd893f79ee6
-
Filesize
7KB
MD53dd8f9ae74e96336dcd3370b38161490
SHA118dac3cee953266c0b582b338e5d0070add19ca9
SHA256c653e697e19c0e6823b407d9eaf632ea397c689456f4ae920814d8fcd173fd7e
SHA5128e03fecc8fc0d8a35d540e0f712f6aa1fe91742aaf33b8daa77f06cfe5cc4d2558674d77bd558d6f52f3625847758a887c5f12e1b84585b59a0187b8e1c4be5d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56f61a730fd04a3db7d04ed1ed89fbee2
SHA16963f5b4ee2b2a36c4092c6bd25265bda69a1a64
SHA256d035640a2f7a5046607a18f95cbd556b24b565d1c104b4f7466a3b43b60c9cee
SHA512f5cbf6cf85dc7352aaed62a85a9e8e21e1a7500b753394596963964c4fea98152b11dfab619bc20572c981f0641dc2ca34cca3752f4fde5a8e688a3c5beb95b8