Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
63ec33f1e86cd102c5f28164e7d75cd8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63ec33f1e86cd102c5f28164e7d75cd8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63ec33f1e86cd102c5f28164e7d75cd8_JaffaCakes118.html
-
Size
63KB
-
MD5
63ec33f1e86cd102c5f28164e7d75cd8
-
SHA1
5b276ab3b5e7e013eb34d07cca65bf6d5c6e9c97
-
SHA256
005b260c7a39c1e46eebaaf6893cd7d0083c33b306b3bf60d41166b8b5993045
-
SHA512
638a5feb4f65dc0e86650e83f1d19e6339f48a1fd379c4cc2c7d44b83e6ca6be2fe5ce649dccd203fbff4bc10b47eb3c36097fafc5c5b9ea3356943d2d582a8c
-
SSDEEP
1536:lT+rjIPBEwwaaFFPPwwmmmmmm9kyX52ramMXBaRqNQGiTaywUIadyrvyOndV7Bvo:QrCfGiWyOndV7Bvo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4004 msedge.exe 4004 msedge.exe 1664 msedge.exe 1664 msedge.exe 2920 identity_helper.exe 2920 identity_helper.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1664 wrote to memory of 4892 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 4892 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 548 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 4004 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 4004 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe PID 1664 wrote to memory of 3344 1664 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63ec33f1e86cd102c5f28164e7d75cd8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7e4646f8,0x7ffe7e464708,0x7ffe7e4647182⤵PID:4892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,1411597696560737744,543699961114510998,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:548
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,1411597696560737744,543699961114510998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,1411597696560737744,543699961114510998,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2540 /prefetch:82⤵PID:3344
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,1411597696560737744,543699961114510998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3656
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,1411597696560737744,543699961114510998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3544
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,1411597696560737744,543699961114510998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:2500
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,1411597696560737744,543699961114510998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:2216
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,1411597696560737744,543699961114510998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,1411597696560737744,543699961114510998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:2716
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,1411597696560737744,543699961114510998,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:2976
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,1411597696560737744,543699961114510998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:3956
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,1411597696560737744,543699961114510998,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:1412
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,1411597696560737744,543699961114510998,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4752
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3604
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5c762d79508b8752a11a62acad1b26dfd
SHA11fba51213ac5d828975263922778130d9efe84fc
SHA2568bb5a5de744a060a65d515d88c153134b1e365329256d260fcabe4e196b3da7f
SHA5129cd37f26dcf71c5972e181a180b6da868923cc9faffadbd15763d43462f46c0b569163be1777b977ec73de87e3984ad235af7dd497b3565de39aad2cb6f356fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5db9b51964b772cc9770c22e1e0d75adc
SHA107a4dee6c87ada99e96a50fc1d62f99c46615990
SHA256d58617a58778efbfb29b1b97c007bd56d14e6842e2899067d5b4e5d649219fd7
SHA5123af4e183377f8a1c576386d36b545d5228a1ba04a3581ac4d49a26d5bfb7f9b37fe36c660d6f57336813819396549647698345c4599609f49529c5e5e8ce920b
-
Filesize
11KB
MD59021b59e4cefb229f5a8d142c98d1bb7
SHA1ff56e0e448e8a1046a593453364d21adceb34c84
SHA25657728bbfa71f51dc89b8f1777d02898c52bd361a9d720d055b5c1aa465e2fafe
SHA51200117dd732a09ff19a4abfee78581286640fa26134248a3342c43452979f7f0594a013f660d470813afbefee9a840b0cb2abab6e7997bad1f82d2acd42094911
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD53cc9a79256de5c1bb20398b3faa11548
SHA16bfebc54388039fa69f7eb3e39c19af185e03e2d
SHA2563a5d123867c5fecc120e3f8fabee6544e843af9e51e20a6c5e81696e9f35b924
SHA51200f81fa57d7a770ed9a69598531f4c9350b25b0dc056ef73d123a83f41bde68e141b9c8eef2315a8316c3e36326efecdf16edfb4eb41bcab3d3f6e832fff4364
-
Filesize
1KB
MD5cca54110410c991c5217f1034306ae01
SHA15edef82e8ebc621cd52699cab134aca199387b2c
SHA2562be520a82017525e25e20d0ef1028cea66649ae7c13044ac76eb2457be8f1550
SHA5129a12d8b2e13c7520872c21265256f4f2d1ce129994729867f95f9f06964d1d1ce95821016ab29100f06891cfca1c80c0fe8e93587ed42267400b337dacf4b6e7
-
Filesize
5KB
MD55765c9804861697455912b94b3f95cd7
SHA1930bf7572620a60bb65a3cf27a1c431b58d61f59
SHA2562e93f35c40d2c51f260bc1fcaa8629a804a3b3202c8b91cfd509fcfaeab1bfac
SHA51218c3cfa5b1e34e2d17bc1879f6d00fa033adbb83b140d69d443d475e3c0d4d4b03d4e44919fd316eb96623bf136e2d066f910d88e3236e0fa80a91730813d733
-
Filesize
6KB
MD5520e886475169eb87dfc6b4bbf694974
SHA1fc49b4a42176d5c56d2d501e1a7d71d71955f6f1
SHA256944b0d5d18d1634e754673dfba926fdf6dbff41ae23aa06052b251f6415646e4
SHA51233aee63cf8acb43babbcce39fe7bc7ba593f34be01bacce47c7fe6e476198846112d6ccbcc0cb5dfc53fe104f905af03e9138af28ec0e4de57468f67eaed1a2c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e