Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 10:31
Static task
static1
Behavioral task
behavioral1
Sample
f7cfa86f26f69a6a352b5b85179e9c3a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7cfa86f26f69a6a352b5b85179e9c3a_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f7cfa86f26f69a6a352b5b85179e9c3a_JaffaCakes118.html
-
Size
432B
-
MD5
f7cfa86f26f69a6a352b5b85179e9c3a
-
SHA1
2e843ada4fa9360e20e7f6b5c3bdc8c3f331ca52
-
SHA256
15216f33ce0fcaeab4e48b5eaf9a7fb70536398dbf8e38fe18e2cb1393a0196f
-
SHA512
c516993e18f40744edd89e601b9dc9873c0a7cc1c722734c77db66a3c9d0d0b9c987127ca879ccf86ccfe1edc63d5cc348aa84d3ed3b723c1ecc0355f1e6d638
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2396 msedge.exe 2396 msedge.exe 3496 msedge.exe 3496 msedge.exe 4836 identity_helper.exe 4836 identity_helper.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3496 wrote to memory of 4296 3496 msedge.exe 86 PID 3496 wrote to memory of 4296 3496 msedge.exe 86 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 4888 3496 msedge.exe 87 PID 3496 wrote to memory of 2396 3496 msedge.exe 88 PID 3496 wrote to memory of 2396 3496 msedge.exe 88 PID 3496 wrote to memory of 832 3496 msedge.exe 89 PID 3496 wrote to memory of 832 3496 msedge.exe 89 PID 3496 wrote to memory of 832 3496 msedge.exe 89 PID 3496 wrote to memory of 832 3496 msedge.exe 89 PID 3496 wrote to memory of 832 3496 msedge.exe 89 PID 3496 wrote to memory of 832 3496 msedge.exe 89 PID 3496 wrote to memory of 832 3496 msedge.exe 89 PID 3496 wrote to memory of 832 3496 msedge.exe 89 PID 3496 wrote to memory of 832 3496 msedge.exe 89 PID 3496 wrote to memory of 832 3496 msedge.exe 89 PID 3496 wrote to memory of 832 3496 msedge.exe 89 PID 3496 wrote to memory of 832 3496 msedge.exe 89 PID 3496 wrote to memory of 832 3496 msedge.exe 89 PID 3496 wrote to memory of 832 3496 msedge.exe 89 PID 3496 wrote to memory of 832 3496 msedge.exe 89 PID 3496 wrote to memory of 832 3496 msedge.exe 89 PID 3496 wrote to memory of 832 3496 msedge.exe 89 PID 3496 wrote to memory of 832 3496 msedge.exe 89 PID 3496 wrote to memory of 832 3496 msedge.exe 89 PID 3496 wrote to memory of 832 3496 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f7cfa86f26f69a6a352b5b85179e9c3a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9872f46f8,0x7ff9872f4708,0x7ff9872f47182⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,9796280335589664044,16568935863869905715,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,9796280335589664044,16568935863869905715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,9796280335589664044,16568935863869905715,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9796280335589664044,16568935863869905715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9796280335589664044,16568935863869905715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9796280335589664044,16568935863869905715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9796280335589664044,16568935863869905715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9796280335589664044,16568935863869905715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9796280335589664044,16568935863869905715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9796280335589664044,16568935863869905715,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,9796280335589664044,16568935863869905715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,9796280335589664044,16568935863869905715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9796280335589664044,16568935863869905715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9796280335589664044,16568935863869905715,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9796280335589664044,16568935863869905715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,9796280335589664044,16568935863869905715,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
Filesize
360B
MD56e1943f5a783b2412c667b828592af5c
SHA1983becf61c44577a68cbc6f75993f411a46884d7
SHA256934af73b3ef7ca400e625fbd37cdbe89439c25a5fd7349c206a82b99f3d61969
SHA512e397286603cce28ee158163246d9a788ba47c4fe340e5825f9b4b0fd7154f77663f6235bbe5e8adf18a4e1a576260186b4e29b4223c6a7f82e801fbc74351175
-
Filesize
6KB
MD53d067a6517010159335c31c84a91caa6
SHA14bf199367531a8d5df738a40f0ff8ef7f8546100
SHA256ddb8c790cc6130f18e57285ca5c4a17f69adb306b93d6555e3a02eb83a7fa2c2
SHA512019bf3eb12c20b13bb2dab55915d842ac9cc776032fef2ab4845d1f855dc4bdf1c3cb69f44b4b47cfdcc6e7c25bf5e33e3a34a37979ddd2267a342d4fef34845
-
Filesize
7KB
MD56fd2ba0f5c593de1324ae5a6ca1f2352
SHA1430fc933b2e3141ef502f51a460ca1c8a90d6f9a
SHA256ca655cd3de0be730531a7c752398e629cf2c1fa1cdf611492d2aeebde2f4e924
SHA512e577d37e6247d62ea3c61ed4a1752d34ddff062500a515a29b5c5049287dde517b7765e5b2586454f73109cbe156dc7e8638420896530e3b45b6517d820de144
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD56dfd419b74bc91bcae6211c3e20de2b1
SHA13bef8996e26fd7923ba3e8564d7db2dcd897424e
SHA2561589b898b4bf0561e04eef60ea74eea46ec156268a672f7d5d7ca5d4efa89c62
SHA512c4648922cf088d36b2881927361a3dfdb56ec163f7fbb4e89886325873ccf43e0e7652a004908b104c58295f2899f8d6f34c55d8838d1e024cacb3c754ad79a4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe578656.TMP
Filesize48B
MD584b30a89132832cb5852966d4962ba29
SHA1ff949d007973cfea2f55fa007c48940c690daa98
SHA256b9d661d492a43df673a52f8e79202e42dbf77ae3e20059ecec3e2c8a9e5b9d67
SHA512146283e1f175a1184257c0e1797d484932e9934e0e005fd4fdbcad72ecece2bd32393b2e90799ec52ea4a62e511d5d9df53615f48e5cc5a75686e07219975ed1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5dcf7441c2697456202f135950c60858f
SHA1e967a7e10a28d0c01a103e320141e98aa44b791f
SHA256de65c7231b5221273b4228a15ddda33d8b93731e66e0b0803aaafedde2cdcf09
SHA512bc0300f9530497642086c525b11b66e227c93f8c69bef61ef2c7ff844c41b0d4239ea9d5cd97533dcc3ef6a48c22fdd98b0eb2bc991f508f0bb87b7e2b3edd0a
-
Filesize
11KB
MD56feae691a32d1dac3550f767dcf7ec55
SHA164594e5ef0b00502c2198ec8c6145c73b03f6a9f
SHA2566b6b3e5a745c77f4fadb4566e2ca3cadc5687859aa851576e93b5445138f84b6
SHA512d49cd97db7532b3c883132509b6fbd0c0897ee37864944a18940740fb0cbc769e6bc400dfc102cfc323964970191f0c8cf0e9609ed764686daa1342d6f9c6abe