Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 12:38
Static task
static1
Behavioral task
behavioral1
Sample
8e1a3f5cb5bd19c92a7d81eaa20352f1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8e1a3f5cb5bd19c92a7d81eaa20352f1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8e1a3f5cb5bd19c92a7d81eaa20352f1_JaffaCakes118.html
-
Size
175KB
-
MD5
8e1a3f5cb5bd19c92a7d81eaa20352f1
-
SHA1
63cb15940c58fa2b97ecd8fbdc16277882b68a13
-
SHA256
c3a0f42189a6ab7e50014a3978de7d52a3ae4902b86dd7b37080d5b5de6ab932
-
SHA512
09273a4f7907368afaad5d0a37c79a49cf69d70139284dbb98698db2e33901c446cc3308704d451f7b7cc26848f6bb4a35d241b16ef63af65f208d4c8193a7b4
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3TGNkFUrYfBCJisi+aeTH+WK/Lf1/hmnV+:SOoT3T/F7BCJi4m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 4980 msedge.exe 4980 msedge.exe 4780 identity_helper.exe 4780 identity_helper.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4980 wrote to memory of 712 4980 msedge.exe 82 PID 4980 wrote to memory of 712 4980 msedge.exe 82 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 408 4980 msedge.exe 83 PID 4980 wrote to memory of 3156 4980 msedge.exe 84 PID 4980 wrote to memory of 3156 4980 msedge.exe 84 PID 4980 wrote to memory of 4572 4980 msedge.exe 85 PID 4980 wrote to memory of 4572 4980 msedge.exe 85 PID 4980 wrote to memory of 4572 4980 msedge.exe 85 PID 4980 wrote to memory of 4572 4980 msedge.exe 85 PID 4980 wrote to memory of 4572 4980 msedge.exe 85 PID 4980 wrote to memory of 4572 4980 msedge.exe 85 PID 4980 wrote to memory of 4572 4980 msedge.exe 85 PID 4980 wrote to memory of 4572 4980 msedge.exe 85 PID 4980 wrote to memory of 4572 4980 msedge.exe 85 PID 4980 wrote to memory of 4572 4980 msedge.exe 85 PID 4980 wrote to memory of 4572 4980 msedge.exe 85 PID 4980 wrote to memory of 4572 4980 msedge.exe 85 PID 4980 wrote to memory of 4572 4980 msedge.exe 85 PID 4980 wrote to memory of 4572 4980 msedge.exe 85 PID 4980 wrote to memory of 4572 4980 msedge.exe 85 PID 4980 wrote to memory of 4572 4980 msedge.exe 85 PID 4980 wrote to memory of 4572 4980 msedge.exe 85 PID 4980 wrote to memory of 4572 4980 msedge.exe 85 PID 4980 wrote to memory of 4572 4980 msedge.exe 85 PID 4980 wrote to memory of 4572 4980 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8e1a3f5cb5bd19c92a7d81eaa20352f1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ad3946f8,0x7ff8ad394708,0x7ff8ad3947182⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,15388880805120343157,6728378533664396640,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,15388880805120343157,6728378533664396640,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,15388880805120343157,6728378533664396640,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2572 /prefetch:82⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,15388880805120343157,6728378533664396640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,15388880805120343157,6728378533664396640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,15388880805120343157,6728378533664396640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,15388880805120343157,6728378533664396640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,15388880805120343157,6728378533664396640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,15388880805120343157,6728378533664396640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,15388880805120343157,6728378533664396640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,15388880805120343157,6728378533664396640,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,15388880805120343157,6728378533664396640,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,15388880805120343157,6728378533664396640,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,15388880805120343157,6728378533664396640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,15388880805120343157,6728378533664396640,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,15388880805120343157,6728378533664396640,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3376
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD59e16aa5a343b0e9d1c3184e02c320f07
SHA1b52e3e541028a73c7cd052f58da1c371d578c3c6
SHA2561c7a037a7e5c9e7a2a63af75c6f66a0e43b361d483ca8c86f2dc5edca5b522fb
SHA5126e2bd160d3e900f7de64243193869feb49a490030a74c742455f75d880ffdfb1992bbe262317645baa7c7a320c2a8238a21eb6a7b63fb3753777b05950b563b3
-
Filesize
2KB
MD507de8423cce7de14ea22cb8f23a7afe4
SHA1a1714a0d81142c6d2ca232f652f10415c305f826
SHA256242c3c2429c5ae23261b0ce29767abb644b50d213a86afa49771a6de747f910c
SHA512738477025182740e13584d52c0c4e9b50eb2eb77f99834920c80d4afa9590d5de07fb6c9c994cf79ea0ab1a632b1a8e726c51b9845e9411ccd08b97511df2c05
-
Filesize
2KB
MD5bcaa813a837123ef21966036b88960f3
SHA19742fa0245083479f694fde61837d58907a5c5de
SHA2566a3762fef74bc9625e16ba415accc5cb9cb96cec3da5b4ad522d5a574e3427b5
SHA5126405aafc38b5a608b3d42dcb29271dd623b2a1f6dfef22171321481c4b0e77800218569e30b87fc2617af4311b8e95e3e769917d3241259ee974e322c3d4c8a1
-
Filesize
7KB
MD520ee15fbe700a00375f6222a373cf065
SHA13537f38ff846ab7069844632488e6628134392f8
SHA256b37d4a7c728092efccaa1b7de75a909b257e7094ae1309a312d92d6819ff3bcc
SHA51216aa7bc9cee59a3ffcb4d99781aac0805a8346a9232159dffa09ffcb05246a5aa7f00d126e3237f07fae1f559a12d14232b8eb86f2f40560a7dbb8f3e5149084
-
Filesize
5KB
MD53a509fb1427ffcb77c0dc0d485120c2d
SHA12f167b4c2a334b41fcb4bc27618e01a5725f38ff
SHA256484be39fa5cb7cb769a3ed588d1af5031665d130b0e893fdb53e481578645333
SHA512d87965426cf83ede050c19fb0a0231a980f0fe052aeb9a952c532d3be07894aadb2e1afc9ba75904b58a460542937228a9b0a7c68c62a63d477427df6221c7dd
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5c18a55bbb8528c085a3ab5d545d56e85
SHA16a0fe2aa36fdfd7b33e691fd55c97f62961531b1
SHA2560834760d30a7b1ae977342f61f866442848200375437b0facdb6575536ff1b8e
SHA512338d1a220c0b4c40cbfca255082c5b57658841b0f5c9373cd874aa71b097ac0da6acfa5def2facc1e4ff815b7bf1ff957d1428fcc6d4ae89a194ac2637b96094