Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:01
Static task
static1
Behavioral task
behavioral1
Sample
eab849c6d29b3b740ff1d1cb85e0aed7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab849c6d29b3b740ff1d1cb85e0aed7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab849c6d29b3b740ff1d1cb85e0aed7_JaffaCakes118.html
-
Size
64KB
-
MD5
eab849c6d29b3b740ff1d1cb85e0aed7
-
SHA1
f69c03603ee68b32a44016f1a4e26e4164507997
-
SHA256
51d0eeea7e939a2708a34781e837ede0b5feae33e151ba44b1e5e5b7bc451fff
-
SHA512
04b3afcd4c9d92de5793dc82f311fb14899b305f8f1d36289f850c63158d80050769458321a16697d0fdb7242f4f40d669566fbabe6adc5a8921fe6de441c34f
-
SSDEEP
768:SanJFqckZDbLo4PZ+pYi5VPh+mLBnh+twrlcjzmAzkVsGsHTopRG:SanrqckO4PZ+NVPfLGzmAIAgRG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2552 msedge.exe 2552 msedge.exe 4356 msedge.exe 4356 msedge.exe 3664 identity_helper.exe 3664 identity_helper.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4356 wrote to memory of 3484 4356 msedge.exe 82 PID 4356 wrote to memory of 3484 4356 msedge.exe 82 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 1724 4356 msedge.exe 83 PID 4356 wrote to memory of 2552 4356 msedge.exe 84 PID 4356 wrote to memory of 2552 4356 msedge.exe 84 PID 4356 wrote to memory of 4884 4356 msedge.exe 85 PID 4356 wrote to memory of 4884 4356 msedge.exe 85 PID 4356 wrote to memory of 4884 4356 msedge.exe 85 PID 4356 wrote to memory of 4884 4356 msedge.exe 85 PID 4356 wrote to memory of 4884 4356 msedge.exe 85 PID 4356 wrote to memory of 4884 4356 msedge.exe 85 PID 4356 wrote to memory of 4884 4356 msedge.exe 85 PID 4356 wrote to memory of 4884 4356 msedge.exe 85 PID 4356 wrote to memory of 4884 4356 msedge.exe 85 PID 4356 wrote to memory of 4884 4356 msedge.exe 85 PID 4356 wrote to memory of 4884 4356 msedge.exe 85 PID 4356 wrote to memory of 4884 4356 msedge.exe 85 PID 4356 wrote to memory of 4884 4356 msedge.exe 85 PID 4356 wrote to memory of 4884 4356 msedge.exe 85 PID 4356 wrote to memory of 4884 4356 msedge.exe 85 PID 4356 wrote to memory of 4884 4356 msedge.exe 85 PID 4356 wrote to memory of 4884 4356 msedge.exe 85 PID 4356 wrote to memory of 4884 4356 msedge.exe 85 PID 4356 wrote to memory of 4884 4356 msedge.exe 85 PID 4356 wrote to memory of 4884 4356 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eab849c6d29b3b740ff1d1cb85e0aed7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff9b2b846f8,0x7ff9b2b84708,0x7ff9b2b847182⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,2010307882991214348,9626949321625376866,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,2010307882991214348,9626949321625376866,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,2010307882991214348,9626949321625376866,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2010307882991214348,9626949321625376866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2010307882991214348,9626949321625376866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2010307882991214348,9626949321625376866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2010307882991214348,9626949321625376866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2010307882991214348,9626949321625376866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2010307882991214348,9626949321625376866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,2010307882991214348,9626949321625376866,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6684 /prefetch:82⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,2010307882991214348,9626949321625376866,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6684 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2010307882991214348,9626949321625376866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2010307882991214348,9626949321625376866,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6284 /prefetch:12⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2010307882991214348,9626949321625376866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2010307882991214348,9626949321625376866,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,2010307882991214348,9626949321625376866,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2636 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD59a8948933b63c76857b5f0b1ef79c49a
SHA111f88a14235cfd997fa020086a8538832fabb18b
SHA256d829c86dcf040485b45dd775476c042b77c7f1060c63fb097ed7b3039bdb811e
SHA5121391e43cc78aeace78ef99d7de64a92bf99416a045fd71642e193161ddb6dd022c5ec9391fe824aa9aa6ad792ed4958524041ef52ede629d4db2348f90a93c79
-
Filesize
2KB
MD5bb7c9b3f038385de4651d304a80457e7
SHA1d3c13db80e2d4e0ba4b1841f2af201199e592aae
SHA2561527eb7be67f19cefaff1f1cb52304d8b059dd009e8ad1df89cee1df27d52812
SHA5125fa02304fe362fc5eae8720aaa19a1a1dd36d7f78a428177104c10959e6736aa541ee41c7cdb8ed7497abec7f7c7d87939f1abc2d3a59f6aba7314cd66078b63
-
Filesize
2KB
MD5a493bac5f4a287a7ad638f49c2ef014c
SHA15a706164a13b42a4d8b9ecc2b1d06f42e8f22d66
SHA25656874684bbeddf990c1c64977c9f120a50fcb2458cf87c461c9c1e14a0fc34f8
SHA51253e59dcc2f6c7de7ea2bd93c7003f234bcf2001945590ad55db129bda0e86496238d7d0f4c618c83fde3475d45562d3cf8d7a36551129b09669124ca7dce8da5
-
Filesize
5KB
MD5bd4615fbbd3a0c93a1e17ba1b222c913
SHA12d82066e4adb66aec91679e40eb1d66cb7840843
SHA256db819be6eba2f00e246a365607866fdce9d25774dde8f6cf0994f2f1460ae50e
SHA51219bd33ca2bedd4f3f34300bfab1b8db664a9feeba86f5416d57f694559a84282b43e3a42246ef29ff028988d76758fd3ac7e8b75c6bd248faac4d421f785a692
-
Filesize
7KB
MD5c5253e30b87932cf0c59fd6ff58e929d
SHA1e1475879c3ed7bcf0e66f4bfd783ca67af7aba3c
SHA25618375e5b1347a37cc203544b5f005c66619a8509bb6646406b95db10889bf9a3
SHA5123025149594969a048a0e7279484254364c7a070c19c65b45da555a0c0d6e38d1f3a2a39abb46afbef63cf8c2964f5c79b15f7f7e5aa179f5763223679ca68acc
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD536b9cc025a1acb89052ee66c4c2d9d6e
SHA1d03dc9e4b78763500f91e8a17c3d9efefcd78b10
SHA25623cff2e2cdd0a35e4bd7f19753c3550870ded2e0901464d36812eb18f77959c9
SHA512739602cd2e807879419d635065fb17463784fbbfa0b719aff606f4c5514068981d1824636fc09ec4934c5d5763097b87e9798bfb46c46234c4d340accf6c2511