Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
735cdab6335e383fbaf5bf6a07fb1906_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
735cdab6335e383fbaf5bf6a07fb1906_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
735cdab6335e383fbaf5bf6a07fb1906_JaffaCakes118.html
-
Size
43KB
-
MD5
735cdab6335e383fbaf5bf6a07fb1906
-
SHA1
79b2d18573256fb19076c7a75c7e4c053e7bc4a9
-
SHA256
5e985f38655123f23d8c2b44527955bfceaa41dd6a1a9391798b9fc115d6697a
-
SHA512
f6f84c34a7f1e29a1277f931aaffb7ab76439b74613870cf7039ffb8747bf516020e8150f5314e131cc45cf6958f8348d6c7306dde20edf819fa571ca17a34de
-
SSDEEP
768:0ayHHvPWloJ65UQxo1eOwQMZl1CoZEtff2Sm0r:03HH2lm65A1eSMzZEtfLr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 3372 msedge.exe 3372 msedge.exe 1656 identity_helper.exe 1656 identity_helper.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3372 wrote to memory of 536 3372 msedge.exe 84 PID 3372 wrote to memory of 536 3372 msedge.exe 84 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 3924 3372 msedge.exe 86 PID 3372 wrote to memory of 1172 3372 msedge.exe 87 PID 3372 wrote to memory of 1172 3372 msedge.exe 87 PID 3372 wrote to memory of 232 3372 msedge.exe 88 PID 3372 wrote to memory of 232 3372 msedge.exe 88 PID 3372 wrote to memory of 232 3372 msedge.exe 88 PID 3372 wrote to memory of 232 3372 msedge.exe 88 PID 3372 wrote to memory of 232 3372 msedge.exe 88 PID 3372 wrote to memory of 232 3372 msedge.exe 88 PID 3372 wrote to memory of 232 3372 msedge.exe 88 PID 3372 wrote to memory of 232 3372 msedge.exe 88 PID 3372 wrote to memory of 232 3372 msedge.exe 88 PID 3372 wrote to memory of 232 3372 msedge.exe 88 PID 3372 wrote to memory of 232 3372 msedge.exe 88 PID 3372 wrote to memory of 232 3372 msedge.exe 88 PID 3372 wrote to memory of 232 3372 msedge.exe 88 PID 3372 wrote to memory of 232 3372 msedge.exe 88 PID 3372 wrote to memory of 232 3372 msedge.exe 88 PID 3372 wrote to memory of 232 3372 msedge.exe 88 PID 3372 wrote to memory of 232 3372 msedge.exe 88 PID 3372 wrote to memory of 232 3372 msedge.exe 88 PID 3372 wrote to memory of 232 3372 msedge.exe 88 PID 3372 wrote to memory of 232 3372 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\735cdab6335e383fbaf5bf6a07fb1906_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcf1aa46f8,0x7ffcf1aa4708,0x7ffcf1aa47182⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,9102051819583310128,14176812278450599925,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,9102051819583310128,14176812278450599925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,9102051819583310128,14176812278450599925,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9102051819583310128,14176812278450599925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9102051819583310128,14176812278450599925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9102051819583310128,14176812278450599925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9102051819583310128,14176812278450599925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9102051819583310128,14176812278450599925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9102051819583310128,14176812278450599925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9102051819583310128,14176812278450599925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,9102051819583310128,14176812278450599925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 /prefetch:82⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,9102051819583310128,14176812278450599925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9102051819583310128,14176812278450599925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6836 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9102051819583310128,14176812278450599925,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6584 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9102051819583310128,14176812278450599925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6976 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9102051819583310128,14176812278450599925,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6592 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,9102051819583310128,14176812278450599925,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3188
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5cd39b02d92de66a32bc31e3740322f4f
SHA1f63b2874b4839cd36c40aa1c8fec923f48db66d4
SHA256cb3f1a38865b8eb58d33ab828a219bb6de5428f70724064c76ecdf841e348451
SHA512de5f392ac2aee0caf9cbe4072066b194b2649e399d1a98659dba92903ab8c4128307f0cc34fe4de3b63c79f09b7057d63ccee1828352ae875463ec4802033e9a
-
Filesize
1KB
MD5cd14e4d68d568b5b597b1a491e595b60
SHA1e5fbdbd8e20460c6001ad51741dfef157336d67c
SHA2569d8fcaafebfc32b1251782c0d99c9a10b1a5866b8bd0b65fe71ff4ad6cae0891
SHA512020dd97c92a6dde91eac910058d615b30feceef52cf0af03b776ff692ab4335d82357f3d599ee236d6b48545adc2b41edbbc2f48a020bc0e390ebe954ec0461f
-
Filesize
5KB
MD5cdf449b6f690c35dd627d2f57bc670b4
SHA12a8825b69040799ed7fcd5c3c5c847d7bdd624e0
SHA256538c170f31ca75e37a3af6bc7fcbc18050743a78f2e46e0d52703937ce4a36a8
SHA512637b74e3e125b92006d365985ba1bbb02bc4043032c7591fbc8e16aeee36eaa1685bb648169c7b0eec6fcfa66d834eec501da5237226acb91ab07fdc0ebd5e85
-
Filesize
6KB
MD55f13934a1fc3855aa1dcaedbd57679a6
SHA172fae7d7b2cb48a60909983219b2989c415bc463
SHA256c1ba8ddb68f5cea78fd1f6d7a6ed015848c04f889543a5ed5db00b21ba6c1428
SHA51242655b5e9720839f68cd3f75b8045a773e3dcdce1008c706736b4fb66b8c66a2984841ec32189cbe0b99296923d6d9085b46a833840cade05b280c167ff5a22c
-
Filesize
6KB
MD517e321a0d6142c644103102e366c1be0
SHA1d4a625d0465a8714b1a0a9397360faaf035d9c66
SHA2563baa402d41a7ec67ba779165ba2fa4d32ccaef8f9011c219a78ef1e436b1c35c
SHA5122e942908c4c6ad4ac2dc2ddfbd14c06b7664f2ff9c68aa57e58a0356ff7ee2338a3b1200304629fa4276e85739ab771b0b74f06959e99bf342f897fc95864d0b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b414deeaebf644181401bbb3bb79dfde
SHA13213e035d2920da94ad503877fbd043fdaecf6e6
SHA25677b959c1c7164ccc25d0e61f7491ddbd07a5d0d00a051728c3ccafc6de05c431
SHA512ac00592ef70a0e8d57f477f3ef94cfec0a4cfc895399818a0c6c90efa66b56bd55c73e44f493d732796f845532d8392e82ae3be104da24ec59a1ad55a30574cd