Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 23:04
Static task
static1
Behavioral task
behavioral1
Sample
f221b39caaa5d4048098f402decdea0e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f221b39caaa5d4048098f402decdea0e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f221b39caaa5d4048098f402decdea0e_JaffaCakes118.exe
-
Size
440KB
-
MD5
f221b39caaa5d4048098f402decdea0e
-
SHA1
cedba18cbaafd90015b42013a5321698941f2506
-
SHA256
cc142018830be9cdbf25f11489c1c35b5f6e0e915ceb2b52881e96c3aaa859ce
-
SHA512
9234e67b2b99ddcbd795c45f607acba9c08b2c9cd9b7b33ca32510a088ec17f284ddf7e53bcfe0537ffb62cc20bcc160ba765d73dcb2f48ea6626c2d51ca39ab
-
SSDEEP
12288:6ssSdm7gg1xgg1khFBgqs++DV1BGD0zs++WBg9sSdm7gg1xgg1kh:6stsDBGmsl
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts f221b39caaa5d4048098f402decdea0e_JaffaCakes118.exe File created C:\Windows\system32\drivers\etc\wlog.dat f221b39caaa5d4048098f402decdea0e_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\system32\\ctygwin1.exe" f221b39caaa5d4048098f402decdea0e_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ctygwin1.exe f221b39caaa5d4048098f402decdea0e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ctygwin1.exe f221b39caaa5d4048098f402decdea0e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4376 msedge.exe 4376 msedge.exe 4500 identity_helper.exe 4500 identity_helper.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4916 f221b39caaa5d4048098f402decdea0e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4916 wrote to memory of 4376 4916 f221b39caaa5d4048098f402decdea0e_JaffaCakes118.exe 88 PID 4916 wrote to memory of 4376 4916 f221b39caaa5d4048098f402decdea0e_JaffaCakes118.exe 88 PID 4376 wrote to memory of 2980 4376 msedge.exe 89 PID 4376 wrote to memory of 2980 4376 msedge.exe 89 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4136 4376 msedge.exe 90 PID 4376 wrote to memory of 4316 4376 msedge.exe 91 PID 4376 wrote to memory of 4316 4376 msedge.exe 91 PID 4376 wrote to memory of 2736 4376 msedge.exe 92 PID 4376 wrote to memory of 2736 4376 msedge.exe 92 PID 4376 wrote to memory of 2736 4376 msedge.exe 92 PID 4376 wrote to memory of 2736 4376 msedge.exe 92 PID 4376 wrote to memory of 2736 4376 msedge.exe 92 PID 4376 wrote to memory of 2736 4376 msedge.exe 92 PID 4376 wrote to memory of 2736 4376 msedge.exe 92 PID 4376 wrote to memory of 2736 4376 msedge.exe 92 PID 4376 wrote to memory of 2736 4376 msedge.exe 92 PID 4376 wrote to memory of 2736 4376 msedge.exe 92 PID 4376 wrote to memory of 2736 4376 msedge.exe 92 PID 4376 wrote to memory of 2736 4376 msedge.exe 92 PID 4376 wrote to memory of 2736 4376 msedge.exe 92 PID 4376 wrote to memory of 2736 4376 msedge.exe 92 PID 4376 wrote to memory of 2736 4376 msedge.exe 92 PID 4376 wrote to memory of 2736 4376 msedge.exe 92 PID 4376 wrote to memory of 2736 4376 msedge.exe 92 PID 4376 wrote to memory of 2736 4376 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f221b39caaa5d4048098f402decdea0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f221b39caaa5d4048098f402decdea0e_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.tarjetasbubba.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8dae046f8,0x7ff8dae04708,0x7ff8dae047183⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,8952945908924617448,13188659111615516136,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:23⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,8952945908924617448,13188659111615516136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,8952945908924617448,13188659111615516136,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:83⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8952945908924617448,13188659111615516136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:13⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8952945908924617448,13188659111615516136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:13⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8952945908924617448,13188659111615516136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:13⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,8952945908924617448,13188659111615516136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:83⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,8952945908924617448,13188659111615516136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8952945908924617448,13188659111615516136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:13⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8952945908924617448,13188659111615516136,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:13⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8952945908924617448,13188659111615516136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:13⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8952945908924617448,13188659111615516136,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:13⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,8952945908924617448,13188659111615516136,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2660 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5864aa9768ef47143c455b31fd314d660
SHA109d879e0e77698f28b435ed0e7d8e166e28fafa2
SHA2563118d55d1f04ecdd849971d8c49896b5c874bdbea63e5288547b9812c0640e10
SHA51275dce411fce8166c8905ed8da910adb1dd08ab1c9d7cd5431ef905531f2f0374caf73dedd5d238b457ece61273f6c81e632d23eb8409efbb6bf0d01442008488
-
Filesize
152B
MD5e2ece0fcb9f6256efba522462a9a9288
SHA1ccc599f64d30e15833b45c7e52924d4bd2f54acb
SHA2560eff6f3011208a312a1010db0620bb6680fe49d4fa3344930302e950b74ad005
SHA512ead68dd972cfb1eccc194572279ae3e4ac989546bfb9e8d511c6bc178fc12aaebd20b49860d2b70ac1f5d4236b0df1b484a979b926edbe23f281b8139ff1a9ac
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5114c3a70f36b65b1d15574c0d197dbdf
SHA15251c0d18b794a58a057d83c7f4fa5f2c241b06d
SHA2565fac3d8847c36bc43a46522df2e6f7adc72ed5463873c678e0ce31c618bf23d5
SHA512a95e7bf86647a9fd8e6eede565d6d58f285738ad86346207a552901bcec77fed0b5993e23b97db47f454f612526e733cade0ad55295e5919c51041d188296c0c
-
Filesize
1KB
MD599c750fd1acd2f8b265962b0a4c07424
SHA10d0875116898e0c23fa96778e31072be45c7cced
SHA256027a58936922c9675f2dd8d1cd4f376d8076a35e65b27f9122b04158fb618011
SHA51245aed267f51cbed3ef7d084f1ab2300412d3c83c666ab5880e375021c54479eefec4fa59b910bde1e8ac2d686b22813b3f50dcae4c6f8f2b1fe647e50ad590ee
-
Filesize
6KB
MD5a353a56ec66bdd2dbc0ea0c02aac7b36
SHA16bb0b526cca44a8be651992219c60f7f9011019e
SHA256b08a1253ea5103aeaef7a8b1193eb71b924fa4aa60a348b2661a65c44e5d7199
SHA512c54b02b181c3e3b1dbb94979480ac5f549aabf98e45cff319499a5094127356119aee3f08a5a24dace7ced938e2ea48f21d33c52caf9b4cbb1b7167b3ab2eb60
-
Filesize
6KB
MD5fb7dfec32caed531682239718df3b440
SHA12c5e04908cf8aa28d5d83259ebaafc6cb1e15bb5
SHA2560ddc522cb82f2fdf3dc810ff09b3b10b223479fbfd0762707bb2fe9e9f54e243
SHA5129cd2a106e3c44a4207694cc6ac900f04326027c5ca84d23d2790e4475e7f528648f1ec208820da05632c726b2d666f56d54dc69f32dce4a87fbca3728292700f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD503a4c89eb6ce4f69bffb69d7eede18a2
SHA17f50ee9b134711d1f5a574a2ace0581d2a3d23fe
SHA25639ad1cb8dfdc1419f99e1a321212ea37217c8fd27adba1cb80774d4266090a85
SHA512c47f173077ee0ca38f378c01b8adcc91262d5909c6e5c98a56fe9efc404a534cbd8300c065ad093ae9169a60ccb1a0e53af4a95e45dde96eda179bc2074b1079
-
Filesize
333B
MD5003b33f097947ad806fff25b99556f3c
SHA1abe104b199eafbb84cdb9bbfa2ed294e1a731200
SHA256f02db954fa2e7f5ad3f286037e6087301dcfd7380c5f5dbd7be14656326f430a
SHA512ded2795bbebaca373002fdd309850f3a90670be8a77d632fd1095e4f66f570e7c5330f696620318ed1ef3bd68f98867af0e34ed821872436d42a4579771a3b28