Analysis
-
max time kernel
148s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
8b378823d75b83426ae7637fc8a53dc1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8b378823d75b83426ae7637fc8a53dc1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8b378823d75b83426ae7637fc8a53dc1_JaffaCakes118.html
-
Size
97KB
-
MD5
8b378823d75b83426ae7637fc8a53dc1
-
SHA1
da5975405c5261fb57193abcad2704af949194bd
-
SHA256
2f631b7ddc2e4667015f37e1ae9d239eabf979dc4b0fc7cac8636ad4f6133b42
-
SHA512
e24afd5978d91145fd3e006d766bc158e3fc61561ed8693e9eb9fd9ab7a08a33b14b89eb7767a3fec773da7768ef79479064955ad589785b9bc91b92eb789c61
-
SSDEEP
3072:xvvcopDNoMRMU3doV+5+4DdSza06+7yNrreutjgsf2pKMtxw:xvvcopDNoMRMU3doV+5+4DdSza06+7yr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 3608 msedge.exe 3608 msedge.exe 4504 identity_helper.exe 4504 identity_helper.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3608 wrote to memory of 4776 3608 msedge.exe 81 PID 3608 wrote to memory of 4776 3608 msedge.exe 81 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 3336 3608 msedge.exe 84 PID 3608 wrote to memory of 4396 3608 msedge.exe 85 PID 3608 wrote to memory of 4396 3608 msedge.exe 85 PID 3608 wrote to memory of 776 3608 msedge.exe 86 PID 3608 wrote to memory of 776 3608 msedge.exe 86 PID 3608 wrote to memory of 776 3608 msedge.exe 86 PID 3608 wrote to memory of 776 3608 msedge.exe 86 PID 3608 wrote to memory of 776 3608 msedge.exe 86 PID 3608 wrote to memory of 776 3608 msedge.exe 86 PID 3608 wrote to memory of 776 3608 msedge.exe 86 PID 3608 wrote to memory of 776 3608 msedge.exe 86 PID 3608 wrote to memory of 776 3608 msedge.exe 86 PID 3608 wrote to memory of 776 3608 msedge.exe 86 PID 3608 wrote to memory of 776 3608 msedge.exe 86 PID 3608 wrote to memory of 776 3608 msedge.exe 86 PID 3608 wrote to memory of 776 3608 msedge.exe 86 PID 3608 wrote to memory of 776 3608 msedge.exe 86 PID 3608 wrote to memory of 776 3608 msedge.exe 86 PID 3608 wrote to memory of 776 3608 msedge.exe 86 PID 3608 wrote to memory of 776 3608 msedge.exe 86 PID 3608 wrote to memory of 776 3608 msedge.exe 86 PID 3608 wrote to memory of 776 3608 msedge.exe 86 PID 3608 wrote to memory of 776 3608 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8b378823d75b83426ae7637fc8a53dc1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa63f046f8,0x7ffa63f04708,0x7ffa63f047182⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,17277631271169848410,3932628631844940657,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,17277631271169848410,3932628631844940657,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,17277631271169848410,3932628631844940657,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17277631271169848410,3932628631844940657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17277631271169848410,3932628631844940657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17277631271169848410,3932628631844940657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17277631271169848410,3932628631844940657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3776 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17277631271169848410,3932628631844940657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17277631271169848410,3932628631844940657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,17277631271169848410,3932628631844940657,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6192 /prefetch:82⤵PID:600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,17277631271169848410,3932628631844940657,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17277631271169848410,3932628631844940657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17277631271169848410,3932628631844940657,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17277631271169848410,3932628631844940657,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,17277631271169848410,3932628631844940657,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,17277631271169848410,3932628631844940657,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
44KB
MD523536ccfe05b737ae639fe63ee4cc435
SHA16d2e9822835dc3e6117a4d2addfc8f241fbdbc82
SHA2566ae9edfc411ede03661a3d910fafddab3d6b313d1f4668dc8c5a84c5ab23a3ce
SHA512f416e36b2322bbebd211fd1ea69c88883f00c7b00f14474a5fcce4a408840c0d1b0304eb8941509a38157d0583485f638959eb7d5b9ae668aa88c1d3eee8dd0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD502c2c48c8ce3179fda31790e5ab3cc00
SHA1a47e3252f8cd16b6467890d4c1570daadbd27dc1
SHA2567f2735c2bb2d5cc9b1c6073305671964c34356314a53bb77d28865e673cd8ae1
SHA512c32d0abfb3ade2cf8dd3e773819b6d3f4f3306efa2463fa10b8281f4df2e837414816c5313a83541934f79a86013bc41b90b0a1ec456ac7cb15e60b103d0983c
-
Filesize
2KB
MD5158a6c104518411d1b30a48d15763de3
SHA1dff552ce4b40f5dc2a4648cb9ca25a5b87c9df31
SHA256b3cf6b004aa778fc4422f3ba7001142a8b900df0ab0e96f7022fff75769fd9b6
SHA5123a43316e86ee966009ffa520d10a4f67715728fcaf42489a6cc680ffa12a316493be5ae71d43906b1a8fd860a3df79bdb73a3e12a197445e9ffc7d5beb57a7ce
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5347da9b7e4616a3b9f2661edbeeb9dea
SHA106c8ceb66062f7344be9d7b46e188d7701db80c3
SHA25629ff1e22af12363f93347c9429cf0fab6257ea845ac8ced26b4eac3e33ac0012
SHA5128ed3435ec84c32cb367a4212dce57de88c37a3bfc8e5aaef57ee5c86fcf50a302905936e1af0b50f327d93a2b913a8ea4740140d936b84b3e32285ff7aa4f6dc
-
Filesize
6KB
MD5395e2d9d72814d768132f85d062cc44d
SHA192a538d6603a4e886daf67ec36da92ff8303e452
SHA256cea0434e2e35b242e1903bff55c91ed70ea93b7291486eec97f11f805cbcea4a
SHA512804fe450ec3c6d0983bbf65c85676757f3dea0324b230dcc2801bc567b5dc8baae27378421eebc3d288be5bcf5d52fdd96191bd7ba83f5fc2ec94109aa82226c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD599ac1c5a438ee108b2e099fa021db62a
SHA1d340a0447c4ebe7e989d743e96d7cb3cfcfcbdaa
SHA256b58442a4ea099f4dd10c1d71ec082646c6030c322c0e2de6e029f0d19f0d1f17
SHA512136b5ebc4a4d575b961d483bd2a2e614fa98d5f4460baca9abff2168b8243607a668b06b1ed498e1252d74d659aba4bf5f03e1ed3fdebf1574927f1f15e064a6