Overview
overview
7Static
static
3e11f716f65...18.exe
windows7-x64
7e11f716f65...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDIR/spd.dll
windows7-x64
3$PLUGINSDIR/spd.dll
windows10-2004-x64
3$SMPROGRAM...es.url
windows7-x64
1$SMPROGRAM...es.url
windows10-2004-x64
1About the Game.htm
windows7-x64
3About the Game.htm
windows10-2004-x64
3License Agreement.htm
windows7-x64
3License Agreement.htm
windows10-2004-x64
3Uninstall ...ne.exe
windows7-x64
7Uninstall ...ne.exe
windows10-2004-x64
7$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDIR/spd.dll
windows7-x64
3$PLUGINSDIR/spd.dll
windows10-2004-x64
3Visit Sony...es.url
windows7-x64
1Visit Sony...es.url
windows10-2004-x64
1Visit Whee...om.url
windows7-x64
1Visit Whee...om.url
windows10-2004-x64
1Wheel of Fortune.exe
windows7-x64
3Wheel of Fortune.exe
windows10-2004-x64
3aminstall.dll
windows7-x64
3aminstall.dll
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
e11f716f657e5608382be26bbffe21ca_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e11f716f657e5608382be26bbffe21ca_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/spd.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/spd.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$SMPROGRAMS/Sony Pictures Games/Wheel of Fortune/Visit Sony Pictures Games.url
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$SMPROGRAMS/Sony Pictures Games/Wheel of Fortune/Visit Sony Pictures Games.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
About the Game.htm
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
About the Game.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
License Agreement.htm
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
License Agreement.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Uninstall Wheel of Fortune.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Uninstall Wheel of Fortune.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/spd.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/spd.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Visit Sony Pictures Games.url
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Visit Sony Pictures Games.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Visit Wheel of Fortune.com.url
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
Visit Wheel of Fortune.com.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Wheel of Fortune.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Wheel of Fortune.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
aminstall.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
aminstall.dll
Resource
win10v2004-20240802-en
General
-
Target
About the Game.htm
-
Size
9KB
-
MD5
1be54fc973a1667d1f3afed72d9fadce
-
SHA1
e3e1d778e5a93d00b768676dd7babb98542d57fe
-
SHA256
54bb10d06ac4005d2b0670f499ee65d711c547aee87c4511486430e674c33543
-
SHA512
d3b34389eb2b5f8a99ca215209da03bc16a5ad19549e8ade92d434ab268f59a5257ee5938a1c5e2ddb1246da42e0111d9d33bfa4671460d885db5155223ff83f
-
SSDEEP
192:nYBysQXnENKjY7iE7MUkJWnON+jwN1f0IEf2kMT5c46d9T4MXn1jz:nYY78QBM0fAP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 552 msedge.exe 552 msedge.exe 3400 identity_helper.exe 3400 identity_helper.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 552 wrote to memory of 4488 552 msedge.exe 83 PID 552 wrote to memory of 4488 552 msedge.exe 83 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 3944 552 msedge.exe 84 PID 552 wrote to memory of 4376 552 msedge.exe 85 PID 552 wrote to memory of 4376 552 msedge.exe 85 PID 552 wrote to memory of 2588 552 msedge.exe 86 PID 552 wrote to memory of 2588 552 msedge.exe 86 PID 552 wrote to memory of 2588 552 msedge.exe 86 PID 552 wrote to memory of 2588 552 msedge.exe 86 PID 552 wrote to memory of 2588 552 msedge.exe 86 PID 552 wrote to memory of 2588 552 msedge.exe 86 PID 552 wrote to memory of 2588 552 msedge.exe 86 PID 552 wrote to memory of 2588 552 msedge.exe 86 PID 552 wrote to memory of 2588 552 msedge.exe 86 PID 552 wrote to memory of 2588 552 msedge.exe 86 PID 552 wrote to memory of 2588 552 msedge.exe 86 PID 552 wrote to memory of 2588 552 msedge.exe 86 PID 552 wrote to memory of 2588 552 msedge.exe 86 PID 552 wrote to memory of 2588 552 msedge.exe 86 PID 552 wrote to memory of 2588 552 msedge.exe 86 PID 552 wrote to memory of 2588 552 msedge.exe 86 PID 552 wrote to memory of 2588 552 msedge.exe 86 PID 552 wrote to memory of 2588 552 msedge.exe 86 PID 552 wrote to memory of 2588 552 msedge.exe 86 PID 552 wrote to memory of 2588 552 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\About the Game.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccb1646f8,0x7ffccb164708,0x7ffccb1647182⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,353711796228227302,6677296973350464616,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,353711796228227302,6677296973350464616,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,353711796228227302,6677296973350464616,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,353711796228227302,6677296973350464616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,353711796228227302,6677296973350464616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,353711796228227302,6677296973350464616,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,353711796228227302,6677296973350464616,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,353711796228227302,6677296973350464616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,353711796228227302,6677296973350464616,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,353711796228227302,6677296973350464616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,353711796228227302,6677296973350464616,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,353711796228227302,6677296973350464616,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD563902d819a2ffd483d579b419719a076
SHA1d69be3af12b227be382e68914fb93d329c923bda
SHA256b946f9a7c109a84f682815bd89085d9b30ffd1eb15975f0c0871cc381d27dbe2
SHA512f2f508c89df14ec0342b9898ef3d783899827d3a8f15be76061b31d917e4bc02cca159d8094ce7cc8a332d5715617846cb7a6dc91a145253df344ba3b5406c85
-
Filesize
6KB
MD5b7f16da2ed93080fab88d1495ca81f62
SHA18708d4b7e2b72faea40f1504ff0b254fd443a71d
SHA256565abe7affedc4be52a4d3bb10e78e187b6440195a285090ae6c0ee81d66758c
SHA512ca7910fd5fa50412009bfe04c885cbf69f73e4982d651b23b9c297dbd46253887d1aa63a3276bcd7c82b6079edc37be41ec45337721054501e853f947183359c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD583c508dde72d09af49f791660e71ffa0
SHA1f0db1565b9caacc1c1b524ff4284b7039c8fb8ea
SHA256e982a34b60672b5bf5607dd9290625f335cd007f537946331e1a2ab0088081ab
SHA512c718e702a92d87ed7321786651cb6c9472be22e5a7fc1a228d4251f0f5dcf6726291ce52cea9f96ecac5ab5f3d74a06e1813aa5f2b1d57ff4bef5136257add33