Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
dd64de04b38b2ae6005144758ac86a61_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd64de04b38b2ae6005144758ac86a61_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd64de04b38b2ae6005144758ac86a61_JaffaCakes118.html
-
Size
44KB
-
MD5
dd64de04b38b2ae6005144758ac86a61
-
SHA1
b8660183b931ae1302eada890d8c0f89dfa8d4a9
-
SHA256
9f24464b6e5655c3853b7e593da90fd6add3a3d5ced4e5c4b5a952211c67b034
-
SHA512
fb848d3ff9c12e0cb3eff031e7248cca67feb4245609ee89d537dd892c24ee5162abf40804621e1cca9e1373d15d42ced8761b002658632323b0cc5bd5b6d908
-
SSDEEP
384:6R0NPySt6sCu4FpETLPW4ztSaDHK0HlKa3RSsqUgV2VFCGLGvP7Iz1DGPD74lx5X:64D6NFiCP8ZE/Fwjd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 3476 msedge.exe 3476 msedge.exe 4424 identity_helper.exe 4424 identity_helper.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3476 wrote to memory of 3496 3476 msedge.exe 83 PID 3476 wrote to memory of 3496 3476 msedge.exe 83 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2860 3476 msedge.exe 84 PID 3476 wrote to memory of 2140 3476 msedge.exe 85 PID 3476 wrote to memory of 2140 3476 msedge.exe 85 PID 3476 wrote to memory of 824 3476 msedge.exe 86 PID 3476 wrote to memory of 824 3476 msedge.exe 86 PID 3476 wrote to memory of 824 3476 msedge.exe 86 PID 3476 wrote to memory of 824 3476 msedge.exe 86 PID 3476 wrote to memory of 824 3476 msedge.exe 86 PID 3476 wrote to memory of 824 3476 msedge.exe 86 PID 3476 wrote to memory of 824 3476 msedge.exe 86 PID 3476 wrote to memory of 824 3476 msedge.exe 86 PID 3476 wrote to memory of 824 3476 msedge.exe 86 PID 3476 wrote to memory of 824 3476 msedge.exe 86 PID 3476 wrote to memory of 824 3476 msedge.exe 86 PID 3476 wrote to memory of 824 3476 msedge.exe 86 PID 3476 wrote to memory of 824 3476 msedge.exe 86 PID 3476 wrote to memory of 824 3476 msedge.exe 86 PID 3476 wrote to memory of 824 3476 msedge.exe 86 PID 3476 wrote to memory of 824 3476 msedge.exe 86 PID 3476 wrote to memory of 824 3476 msedge.exe 86 PID 3476 wrote to memory of 824 3476 msedge.exe 86 PID 3476 wrote to memory of 824 3476 msedge.exe 86 PID 3476 wrote to memory of 824 3476 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dd64de04b38b2ae6005144758ac86a61_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffacb846f8,0x7fffacb84708,0x7fffacb847182⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13868803862903520552,12123225364974951719,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,13868803862903520552,12123225364974951719,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,13868803862903520552,12123225364974951719,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13868803862903520552,12123225364974951719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13868803862903520552,12123225364974951719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13868803862903520552,12123225364974951719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13868803862903520552,12123225364974951719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13868803862903520552,12123225364974951719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13868803862903520552,12123225364974951719,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,13868803862903520552,12123225364974951719,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6280 /prefetch:82⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,13868803862903520552,12123225364974951719,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13868803862903520552,12123225364974951719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13868803862903520552,12123225364974951719,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13868803862903520552,12123225364974951719,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4304 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\32f1dcec-80ca-4c7f-8399-6dce69f19100.tmp
Filesize5KB
MD56e718fcba6563fd191717caa75188346
SHA13db1740999434c4f4dd62e95663b1dce8fb04db3
SHA25612a677beba6be640b445f1ed017faf482a628d1f7ee157f7c639469b1dbc81c8
SHA51251a31ddde44585cf29686a1cf6313ba52e0924de07112273fc9a1bfb40413ad42cb2d49729cb9b8da2a12654af28b137f6e84ff455c3e1c234bbb332f01c5746
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD56eb371d7eeb89fab463f76b6ffaa1055
SHA1c825de8a0f9d02f2b79277d6b62d833fbc383ee5
SHA2564ee1dd1bb55bd1d6b751109820693437dbf7a3d8b3a5cb10bbdc5434b6e72b39
SHA51266a268135ddce5e8cc0ccb7298a052482e25983017bcabb121ac62e6f66abd1f45c560ac9dafce592fd51dd2643d5004dfbe0f8021a6aa714689353bf5e17e5b
-
Filesize
1KB
MD5ccdd95673c68c96c4b9e82da3ef1e63f
SHA1d396978f207d0425d69f5697ba29ec1ff735f450
SHA2564f2c843a3e44166701ddb856741bad7097645d9e11d9bc38e2ad2ec61201c022
SHA51275001bf18e84eb7ff91c2646bcecc5dbd2f8337d19b7b02efcea53f9e38d4a9c497b9838b5a81e9ee2ed35eb9f179a792bce4461c32ffc50d90adbe57d2e82f8
-
Filesize
7KB
MD503f4661a8fa8e8b220e66456fc47925c
SHA1e6fee15733ba2a0bacdd0f2f17a040c56bcbd916
SHA256e98ca234ee7dd83b095319bd2e078aa73cdba22877ba13831c261182cb80f5a5
SHA512cfccd00addf34fa9bc28fa89fd1c4a61f659d21c223179c78c25dbe272748c69788c860d8307f10a1d0dad8c8236d5256a11e613862106a61a7d40ee3c116f5d
-
Filesize
1KB
MD5c0c1045e5d8dc5b3bf090dc46619f2bc
SHA1af8034b382649eee8ab4c5cc76145fec10c3e1ce
SHA256f3dbc6ff9e7ed01de9628c7eabbb03d3d4140c94cb009bdbe5f1c2de6022cae8
SHA512993da93edb1d77fcb8a53d822e08a6ad145bceaabf308c660ac867eca1db38505a3cd698781c27237d0f8720ebef854916a2427566526404f51327844605fe53
-
Filesize
1KB
MD5d5fb1910652ef4a80958d7ae15cc2343
SHA1390d7cde853a2277ba2038d797f9f3e199624c40
SHA256475dc22b17e6728af984559e5435e5783143b2cae61b6201068239d5a4d8a28a
SHA512cbb3a42dceace7dc181b124521f9e436876c41fb9ce9a26a08a297e1d53dabd36e58092168202ef36fb22dd822a36e14e14dad08c927e096c70c7091defb4c85
-
Filesize
1KB
MD53c0115e2ab767483d2f59a0a6241eadf
SHA1355d5a9a282efce7d86c494add1b0a8d1de693db
SHA2560b42cb92257bdbf4d02b78893fc0dc774adb1cd04bc8022655d50ee9b6f2e8b7
SHA5121a4af686c87b3b7a06c4d6cf9a006ebcb8df8b7605121e55b8469800eff3e5090d1c1ad0aaa2f6ce52a603579878f96232c6f0f85cc0fa7fa350f8d511d2a2e6
-
Filesize
1KB
MD54cb734a1c64bff75633d4089f59fbec0
SHA1ff3b18ff9e199e777621990cf8a096fa3b633b8f
SHA25678466de264d1dca7e62cac2c05f03118dcac9806c76b828899508746f0780d15
SHA5121a987a4caee25b7ad33f4dc8c5eded3cc8c8e4bb2c231722809232bc3c30dc67dae3b1dba589948e9344b003db917d40d7344a5bb470e2dd4ae380506ae1b77c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b6904874b4b8cb967cbdfc14f4994d6e
SHA1f7efa9a73cd3505ca4881c1aebf20e1f2efad52b
SHA256c0841190ce33fbe56a86fb8503caad74ae5f37f5ad0e9ceff27b3c8ee4f662bf
SHA512561160066502cc908e027b0bb93ce9b8d4cdad953fff98b53b6d5889fc0ce83395d852e0edacc22d915014e78b13433c315f60b995dd6c39ccff7bcddb09ca64