Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 21:35
Static task
static1
Behavioral task
behavioral1
Sample
fdb275321fc84927ac26d90c4c84adc3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fdb275321fc84927ac26d90c4c84adc3_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fdb275321fc84927ac26d90c4c84adc3_JaffaCakes118.html
-
Size
428B
-
MD5
fdb275321fc84927ac26d90c4c84adc3
-
SHA1
61211d0bcd83fd9fb31e7d182c7157edc57cec00
-
SHA256
e1c7b2627a6ae98b40d817fab762877ecd92c2938ec5f6461d087d08c6ce6dc2
-
SHA512
95d1b25ac0b457ae344b4e025d591f8d777f0eecf504235872404c4e8b4734dba03deb1988a1976b2d46dcf1f63e0f321035e9cbb030068379dcf7104d66d58d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2900 msedge.exe 2900 msedge.exe 1348 msedge.exe 1348 msedge.exe 4408 identity_helper.exe 4408 identity_helper.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe 5364 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1372 1348 msedge.exe 85 PID 1348 wrote to memory of 1372 1348 msedge.exe 85 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 4928 1348 msedge.exe 86 PID 1348 wrote to memory of 2900 1348 msedge.exe 87 PID 1348 wrote to memory of 2900 1348 msedge.exe 87 PID 1348 wrote to memory of 1108 1348 msedge.exe 88 PID 1348 wrote to memory of 1108 1348 msedge.exe 88 PID 1348 wrote to memory of 1108 1348 msedge.exe 88 PID 1348 wrote to memory of 1108 1348 msedge.exe 88 PID 1348 wrote to memory of 1108 1348 msedge.exe 88 PID 1348 wrote to memory of 1108 1348 msedge.exe 88 PID 1348 wrote to memory of 1108 1348 msedge.exe 88 PID 1348 wrote to memory of 1108 1348 msedge.exe 88 PID 1348 wrote to memory of 1108 1348 msedge.exe 88 PID 1348 wrote to memory of 1108 1348 msedge.exe 88 PID 1348 wrote to memory of 1108 1348 msedge.exe 88 PID 1348 wrote to memory of 1108 1348 msedge.exe 88 PID 1348 wrote to memory of 1108 1348 msedge.exe 88 PID 1348 wrote to memory of 1108 1348 msedge.exe 88 PID 1348 wrote to memory of 1108 1348 msedge.exe 88 PID 1348 wrote to memory of 1108 1348 msedge.exe 88 PID 1348 wrote to memory of 1108 1348 msedge.exe 88 PID 1348 wrote to memory of 1108 1348 msedge.exe 88 PID 1348 wrote to memory of 1108 1348 msedge.exe 88 PID 1348 wrote to memory of 1108 1348 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fdb275321fc84927ac26d90c4c84adc3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9872f46f8,0x7ff9872f4708,0x7ff9872f47182⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,7500463375724930976,15442550727296958341,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,7500463375724930976,15442550727296958341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,7500463375724930976,15442550727296958341,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7500463375724930976,15442550727296958341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7500463375724930976,15442550727296958341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7500463375724930976,15442550727296958341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7500463375724930976,15442550727296958341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7500463375724930976,15442550727296958341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,7500463375724930976,15442550727296958341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4188 /prefetch:82⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,7500463375724930976,15442550727296958341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7500463375724930976,15442550727296958341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7500463375724930976,15442550727296958341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7500463375724930976,15442550727296958341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7500463375724930976,15442550727296958341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7500463375724930976,15442550727296958341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,7500463375724930976,15442550727296958341,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3604 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5364
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
Filesize
360B
MD56e1943f5a783b2412c667b828592af5c
SHA1983becf61c44577a68cbc6f75993f411a46884d7
SHA256934af73b3ef7ca400e625fbd37cdbe89439c25a5fd7349c206a82b99f3d61969
SHA512e397286603cce28ee158163246d9a788ba47c4fe340e5825f9b4b0fd7154f77663f6235bbe5e8adf18a4e1a576260186b4e29b4223c6a7f82e801fbc74351175
-
Filesize
6KB
MD5897bf30d39acd2ec019b4f2b94369b06
SHA1ea0ec87075d7cb96b432cb9644af53842fcb84cd
SHA256b8d2e71bc638ec83c2647ecb0fc80c3fb020a0e9a79e67fa3a853552d26dd190
SHA512e8307ad5a082c374ec74ee66df8b978415f3f8c8633bc574096d6475dc8d39144af373184fa04b307322b959d86a633f7adec2f4e851505f2843445f816e82cf
-
Filesize
7KB
MD55b8488a440650438f49dc1ab081c6bfe
SHA18ae38ec8656fdb9a70045b8b5dde38db71c4828d
SHA2564e836fef3c7f061cbd86a5aae1c92c735e43bb566c9efe85d78c59b42e49c49a
SHA5126f452e9dafe8064cd0f81b3f19158181a236cefbb72800a3e2d32821bf284626221af4751173b83d1cfd4e0ec5d53020de32a55975cfb3f8f5dfe7a70d48d247
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5caabe68009aed58e04787e50e915c2c6
SHA1af591482d9381c9f9833d24e46f3ee1855f6bb45
SHA256b14fc507f28964d1de2fe8a3fa417a75ee1bb695f98a59f8682c7ce517ec89d7
SHA5125a87d9ad18058e6661219672ba067e6d13fa6aa1c16116a09a82f4e8c349ba7875ae313b426ba7b0a78e3db0c3cdefe88b755f4c9ef8fbee32aefb45c4f3d467
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe578e75.TMP
Filesize48B
MD5214731ccf58e6cbb4399ebced22cf4a3
SHA1ab0986b2766577c262dfab98c29e65ea3499fc18
SHA256362fe0fc25f4eb5633ac4050d10309484d53f98e48cb6709b7b54d035064b6ef
SHA5128c11810084b6f2cf482ea97dfee511e337ff1aad92404e3c2e71d0766b7349c96aa9a01a85870465291d96a1efaf0a5049420b8d31a7ae3f03933b548894da90
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cd0dc7c284b2a2942ca13216b1036e55
SHA14764bc21468472e2ca47a807df2e346ab08d36c4
SHA256bae797e12fc129438cb070efdf02e237f61d7b03055e0782ed80cc3822d36cb3
SHA512639d2bb0a72273defe53910a6306bf294108203385e76e4021b5e48a8a3f53d585faa693fe4d064d66e2c66d1410c9f6f1dbe89bb88bc8325bd7442746a904d3
-
Filesize
11KB
MD56b0c78c261c6420e063c317543611d8a
SHA13a1602bc273c2a927fd0225ed551c6dd269def06
SHA2569086e5f92377295e5ec9f6fcf8367f76039429076bc64cd58034a20613cf87e4
SHA512e6dd8bfce7a87ea8fb79cc9491c1d202e710d596977ba53f019ae6d97b6a9179f3e3983f4a6f3c74a5a579d05046dbd560b79666fa5cd48855794be3ea6c462a