Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
8606794d88dabbf8b2bccd5477c0a38c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8606794d88dabbf8b2bccd5477c0a38c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8606794d88dabbf8b2bccd5477c0a38c_JaffaCakes118.html
-
Size
41KB
-
MD5
8606794d88dabbf8b2bccd5477c0a38c
-
SHA1
7dd6effeb4a310cb5ef6716f79f70aacc32044b2
-
SHA256
cf1a891c45c2b1e0164074b3783764c33c0bccc80e186d372e01ff81d27c8584
-
SHA512
e3ec256bb8c56ed69e457129cdfafb2f22c85ca58cb6ff83751e81711903f6b4cc02a2d8f326067e32d908d6aa7a5bc7787d6612d3246fc217f7d5377d8a8978
-
SSDEEP
384:r7jvHwdTryJxY+T3L9aTvmBxnxhRLM5mc5XWV+PzCsBSGXNEu0:3jqTrExDT3LgTv2nxDLYVNWIVB/XNEB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 4900 msedge.exe 4900 msedge.exe 32 identity_helper.exe 32 identity_helper.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4900 wrote to memory of 1088 4900 msedge.exe 82 PID 4900 wrote to memory of 1088 4900 msedge.exe 82 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 5076 4900 msedge.exe 83 PID 4900 wrote to memory of 4832 4900 msedge.exe 84 PID 4900 wrote to memory of 4832 4900 msedge.exe 84 PID 4900 wrote to memory of 1724 4900 msedge.exe 85 PID 4900 wrote to memory of 1724 4900 msedge.exe 85 PID 4900 wrote to memory of 1724 4900 msedge.exe 85 PID 4900 wrote to memory of 1724 4900 msedge.exe 85 PID 4900 wrote to memory of 1724 4900 msedge.exe 85 PID 4900 wrote to memory of 1724 4900 msedge.exe 85 PID 4900 wrote to memory of 1724 4900 msedge.exe 85 PID 4900 wrote to memory of 1724 4900 msedge.exe 85 PID 4900 wrote to memory of 1724 4900 msedge.exe 85 PID 4900 wrote to memory of 1724 4900 msedge.exe 85 PID 4900 wrote to memory of 1724 4900 msedge.exe 85 PID 4900 wrote to memory of 1724 4900 msedge.exe 85 PID 4900 wrote to memory of 1724 4900 msedge.exe 85 PID 4900 wrote to memory of 1724 4900 msedge.exe 85 PID 4900 wrote to memory of 1724 4900 msedge.exe 85 PID 4900 wrote to memory of 1724 4900 msedge.exe 85 PID 4900 wrote to memory of 1724 4900 msedge.exe 85 PID 4900 wrote to memory of 1724 4900 msedge.exe 85 PID 4900 wrote to memory of 1724 4900 msedge.exe 85 PID 4900 wrote to memory of 1724 4900 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8606794d88dabbf8b2bccd5477c0a38c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffff99546f8,0x7ffff9954708,0x7ffff99547182⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13647867653124349482,6109437978154682524,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,13647867653124349482,6109437978154682524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,13647867653124349482,6109437978154682524,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13647867653124349482,6109437978154682524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13647867653124349482,6109437978154682524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13647867653124349482,6109437978154682524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4264 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13647867653124349482,6109437978154682524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13647867653124349482,6109437978154682524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13647867653124349482,6109437978154682524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13647867653124349482,6109437978154682524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13647867653124349482,6109437978154682524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13647867653124349482,6109437978154682524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13647867653124349482,6109437978154682524,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13647867653124349482,6109437978154682524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13647867653124349482,6109437978154682524,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13647867653124349482,6109437978154682524,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2572
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5c960898652cb0dcd23324d84da01c04c
SHA130c2b5dab923d3ab0a25b7842516bae8f7be8f18
SHA256d6e692dcab69e59137c01a84c17e12e7f833b073fec786f6d8b9eedbdc2988f5
SHA51202d5773017a0f0b60139213fb51e931026c4e7a7e43ad2aeb17f676c2899241bec8120682e197e9c455165c1ea2200c66ce0ba9e6428c29fecbfad471eb509ce
-
Filesize
2KB
MD56e3b30d9a09697478e45a5534ee8d8da
SHA130a30df31c7253a872676c9372bf6710a0e522a5
SHA256eb50586ef0573d018013b8d100343307447d1969c065623362953ffda5903f91
SHA51213590e4891a6502586f00688235c14c5da6cf2da527b0f00d379d46c3aa453a0d54eda3b404ad8ef0337f1dbf6a02c03584792c403314fd8e6c00210bbb45308
-
Filesize
2KB
MD57c2365d828053112861b48e6a8896681
SHA105a17276a8079b98b89a4da1b71ec07d7dbe2381
SHA256fab522238eca46036ec10daca01fab09fa77e7fdeed8a746c5fa84ad08a46bc9
SHA512ff8c87f2656f0c6a6624ccd030816bfdf166ce0c4a0fb203dd91a59b208d2b150eed6f63285b528e1a4f8936cabb489e37efb78abdc98c611ca0fbe37ab4acfd
-
Filesize
5KB
MD568d42125932fe075c8411d7d2887afc3
SHA19413a621d7d94a3cccb32dbba6d13018db764cc7
SHA256c7d681ffe42307a77a878d8fc9d16447af19cedc70ad91f88e03d23d012fdb4a
SHA5128a3a1038db9cc7ffff41a42d31dcce631ea3d3904dfa1b3a7df05b9ca35c6fae8e81cedf79a4242e29c4ce2838f5151be29a5549b20929aedf6dfe19322ab4ae
-
Filesize
7KB
MD55e16b7e8325dfde73be856fb26e58b59
SHA1a198bf800f6938fff51ca1d43c228e9a26994485
SHA2561cf2f5840f816c746e8ef052a020dc73c882d679115efb9db7bb05955ce3cfe7
SHA5121219a01cd81fe23e410df3bdae8e24826c700b7b02abb661698433efce3caa35d497be9047c54dd356df0a2dbcfcad0fd8a56ddd33d623e3dc601a633cbcc957
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD554a3979a313da298f9eaebd87274de67
SHA13302171212ae48b4d6bc97b625426f406650bb09
SHA256c24c343783f59c1822efd9dcadb2fe7ac848762aa8d12de135dc9df92003d91f
SHA512b447b6590e979f8d6ada18254aba4018cf5fb4b6b8d7bc35c1a86901c4c16f2a6a27e11f8723e66e1cc041c29f204951bbac42039895473fd8d58f18faf02fe9