Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:06
Static task
static1
Behavioral task
behavioral1
Sample
68f27559f5040819d2a2601623fb2fc1_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
68f27559f5040819d2a2601623fb2fc1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68f27559f5040819d2a2601623fb2fc1_JaffaCakes118.html
-
Size
34KB
-
MD5
68f27559f5040819d2a2601623fb2fc1
-
SHA1
98ff4d38ef26bc547ef7d7a9984808d60cb75094
-
SHA256
aedb672f4836f0764c358d3fd38a0e44f8106a59d6bc882c40a9fc30bee08930
-
SHA512
a5ccd80964b36998b8dca1cbb53aeabdeed5c599c93a5a8b718e72eadcd54642a766264c3256743edfcd760d4e49e34cb16b60738530668160b6c5dd5a73581f
-
SSDEEP
768:OFGbt1bP8Rb2vbw9AVW/T9bKx+puSpoGec01JC4JXYAX2VGziP:OFGTT8RS09AVW52x+puSpeysZGYOP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3408 msedge.exe 3408 msedge.exe 4936 msedge.exe 4936 msedge.exe 1052 identity_helper.exe 1052 identity_helper.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4936 wrote to memory of 856 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 856 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 4496 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3408 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3408 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe PID 4936 wrote to memory of 3624 4936 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68f27559f5040819d2a2601623fb2fc1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbd8946f8,0x7ffdbd894708,0x7ffdbd8947182⤵PID:856
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13141854664380672481,17308149564063581074,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,13141854664380672481,17308149564063581074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,13141854664380672481,17308149564063581074,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:3624
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13141854664380672481,17308149564063581074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4980
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13141854664380672481,17308149564063581074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13141854664380672481,17308149564063581074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:1968
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,13141854664380672481,17308149564063581074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:5036
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,13141854664380672481,17308149564063581074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13141854664380672481,17308149564063581074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:652
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13141854664380672481,17308149564063581074,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:8
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13141854664380672481,17308149564063581074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:4100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13141854664380672481,17308149564063581074,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:4536
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13141854664380672481,17308149564063581074,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD52770a24f7f5e2811381bd60467bc905e
SHA16ea5eeb51b06fd5c22d4527f0409b40e26f11006
SHA25604093956f82b9ac44a4a3f523506cbc6c355c452138a962c027e0a24e18cb5bc
SHA5127de70b5e71483e354083faeffead643a11a5ba1f55e091865afb41c6c6247ecb9d950039ec0e50444c9bcd94e69bbb6b24e2d05be2d258c89dd04d89035d57b0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD531d04f29f345bb2c21afa4299e2cf0c8
SHA180e998738e2165883cb602eed8c5ab19708e2c21
SHA2561c97f8914e766f18f6ae445e67e292bf628a024702d54d99a0cabe9625ff4e04
SHA5123ad11d22d85e2dc77b50fd9700bcef2cc7b27e8e5995fd69e59b96bb1757bb33045fb44b1310a9b85bb2195b782974d8599c6e0a00f3d09401850ed5503ede18
-
Filesize
986B
MD59e88001e9ea4a5c49cc4dc5a28d9d939
SHA15d0618d7c45ff73c00e6a6f0d6a5bef2e35c7ec7
SHA256a8b6f9aac4ceb9067e24e292314168dbfde2eae7cfc3bbaa181addcfd0a6bf1f
SHA512a5f754ffed78ed7ceda65d43ed4e1523f4c803e46f19fcaaa05d09d05e52d711e3da19cda89fd6fba834d11438176824abceb9896d10dcf19637f8f07d16e413
-
Filesize
5KB
MD5b2cfab1dcd5f1278de3747ac85ff52aa
SHA19c5c439406feb32ce034dfb52ca417dee8756bf9
SHA256f1b5b5e1d9d38c14dd1f4f3e2f1bf12439a3e2203990c323bd1861f346841c5a
SHA512a3755f237dd5ae622febaeeb4465cdabc1c32349be1531d9135ef9cd3dbfea3f1f3c569f12fb52a97dd831ed4fe29cf5e80b0faedefe35c4ed98e4cdd339a3cc
-
Filesize
6KB
MD5ad3f4f654feee689917c1d41e2387499
SHA180e7d436bbe6c1c6d0b39774b4de82c2616ceaae
SHA25665ca5e3a0729ad4d47ba5bf45a6a6eac3d41dee6a478731aeace794b964e3ef9
SHA51200217384879c32db66b25b66258fd1a893c36e702cce9880d2eb1ccc488bbd4aef282701c25ba92656a23c44e586f231981b8956bd247e0a7c45553936c84806
-
Filesize
6KB
MD523f72891dd972b154fa31b16e3690aba
SHA1aac1c8cf096bdf82cb2ae843b692e76f8bda09b1
SHA25607df80c8d597ea9c7942183b5f6b61523bb11c805968417360b72e11fdf8cffd
SHA512b13a163b94ae79ae45c30cff5d729cef9046b7a37cdbc30a6f2f973546065327b3b3481843e404ec091283f061b32e51d45b2f90ab96d5cabc2679f74af9f6aa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55b4762cfd49a8d3b39a74661fd227300
SHA1c04140a93c1517b49e60766f579e94df31fde883
SHA256b1716a28da4bcc716509522378481628070cdadc0604277962630626f8c64ed4
SHA512a79060a084efe1c1239263c16745b624aba448863a56d67ee7b18d11bfbf05ea87f5fd8184e85c194230ef28717567bcc9f4b34b73e0797ce646c495ed107aa5
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e