Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:13
Static task
static1
Behavioral task
behavioral1
Sample
68a82f34327d8fb217f64d3bfc527cac_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68a82f34327d8fb217f64d3bfc527cac_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68a82f34327d8fb217f64d3bfc527cac_JaffaCakes118.html
-
Size
47KB
-
MD5
68a82f34327d8fb217f64d3bfc527cac
-
SHA1
70e2eb14ee06436173ad7343e9cb3b1fa5f646e0
-
SHA256
8cb9d0344d3a138cbeef63c23c628d2d569be1ab3118c44dd6ee1db38e50b802
-
SHA512
7d66d724d5c4c704103ab66aa09ae3a05dafeda8b5dcf60563a5fc86f66776a5b8b403e8d9ac6a257dc7eb3f2fd063e0933decc855f51374c53a1147d09e29e1
-
SSDEEP
768:gk143goF92QJQx6mS/1YTfNdw6tMR10ToqWXyigNANvZOfl:gk143goF92QbeTlX2R10ToqWXyigNANe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 540 msedge.exe 540 msedge.exe 4316 msedge.exe 4316 msedge.exe 1604 identity_helper.exe 1604 identity_helper.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4316 wrote to memory of 4976 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 4976 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2232 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 540 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 540 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1880 4316 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68a82f34327d8fb217f64d3bfc527cac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa439e46f8,0x7ffa439e4708,0x7ffa439e47182⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,10580101364073000315,6838473889022703890,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,10580101364073000315,6838473889022703890,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,10580101364073000315,6838473889022703890,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10580101364073000315,6838473889022703890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10580101364073000315,6838473889022703890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10580101364073000315,6838473889022703890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10580101364073000315,6838473889022703890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3736 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10580101364073000315,6838473889022703890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10580101364073000315,6838473889022703890,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,10580101364073000315,6838473889022703890,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6244 /prefetch:82⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,10580101364073000315,6838473889022703890,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10580101364073000315,6838473889022703890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,10580101364073000315,6838473889022703890,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,10580101364073000315,6838473889022703890,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5348 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5dcf126e123cb4a85b56b8b175df47190
SHA17741cb5cc234f82431dd2a20612bb9f40e82094f
SHA256ef2414dd1e14b80c83ccbabe1f302751415459874ff1aa7ef3e4c7ca44f69db7
SHA51267cc9046342e1c7ca8c3244ddfe117076f0434a4d404bbd39f8f7db75c184da40d79f4fc63bf75d45631fc4f0d08b983cc4404f69ed3689b686af8e7f207edf1
-
Filesize
859B
MD5572a3f258f9bd2884bfa8ea5ee12e411
SHA17db59167fbadbdb59f38c509a434c7462edc7057
SHA256af3f2794b152a82c7cf18fb4de4715f1158d7c536292f6388b481e4cdb49b1b8
SHA512dc8b5adae668290d8af27b30a2bae7c94d271567c83ce6a556f2a5714f85e6a7bf9851a0945dfaace0c9d763690f3d0e88d5bd87877f17f60baddac24eae4e61
-
Filesize
6KB
MD534dc966c3c6a54454b875f355ff66b20
SHA11db76ab7a7cfad4eb7f0c0e07f04b58eadd15d6f
SHA256113464903fd6ee77fa0d88fec8c594c2e9791b57e5ed9b0c72d4918edebee5c1
SHA512e781cab02ac0d8cb6db089fcd924f47a00fad2c80bd0f35a7c6bf5f6a55fc180bf17369c6ef85bc6244f857dc3b139004cec8e38f6a6cdf68e12b5f77d824600
-
Filesize
5KB
MD5305c79db8a4edd062f415bc986c1ab98
SHA10aa9a53607acb67a852da385b5d83ea2762f8b21
SHA2563776db4165be3f3d89e73c1f42001403e08c0be20bb6b129dbf16fabdfa9fa0c
SHA512655fe944732cf0c8df206f8d74dc9977a6808253c57aefc12b8c687061a06caa63deef645f898e512a1417c5607779fc1ea526a9d7f657ebc96482a2a165091e
-
Filesize
6KB
MD53ca087e18c5b50cbba6230cf7aebe539
SHA109803c4bb086e268ec439ff7598435e065b7c648
SHA256e4d31e260fa273668bde14b198205b46d60244ff2816858f08eea45551ea5ce5
SHA5125ac322adb81c293a46eab3ba3e64e21755c58fd41ccc7b430c90344a9abdb5008c0eeed2efa486928eac565868d66cbeaf91993160cac0a90ec2fbb207b90ed1
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5bcbcc4353f8edff1897c6ba34b148ca4
SHA1cb22f138f0a92b4b32e63d6b538785d1a1b1e8c4
SHA25667556e52df226cc5308c27c4ccfe0c9cdc430605df60a5effc1e8b2bac6bf822
SHA512a83f8b7f8cd2a1dd79a120c849dd95f1c452b04c2048041daddf269fcefeee347642edd8cdbfe46ed8229ab2155d8dd0a0d804be1e22c122193ec38df5c446bc
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e