Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 10:49
Static task
static1
Behavioral task
behavioral1
Sample
83f64ca2a54110688894a30c3a3816b3_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
83f64ca2a54110688894a30c3a3816b3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
83f64ca2a54110688894a30c3a3816b3_JaffaCakes118.html
-
Size
89KB
-
MD5
83f64ca2a54110688894a30c3a3816b3
-
SHA1
639d357a55b21d6183827ea4f4db575965abf1e6
-
SHA256
72f7268eed89615ba55ab4336c02283b6aabb5b7f0ae1b96bfa31face7ffaf1c
-
SHA512
a1f15baee3b4e7facd7324a7fb1df781cb8a7c4395179838878a68a404934ff64940bee77fce657624b93b8961dc815c95001c5829d1a81b9b9ca5dbeb4b843b
-
SSDEEP
1536:OGsdojkKLk0rcn+7K5aoPCk1NhBuOoolXU:OGxj4kcn+7kbPfhBuOoolk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2516 msedge.exe 2516 msedge.exe 4228 msedge.exe 4228 msedge.exe 872 identity_helper.exe 872 identity_helper.exe 5760 msedge.exe 5760 msedge.exe 5760 msedge.exe 5760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4228 wrote to memory of 396 4228 msedge.exe 83 PID 4228 wrote to memory of 396 4228 msedge.exe 83 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 3708 4228 msedge.exe 84 PID 4228 wrote to memory of 2516 4228 msedge.exe 85 PID 4228 wrote to memory of 2516 4228 msedge.exe 85 PID 4228 wrote to memory of 404 4228 msedge.exe 86 PID 4228 wrote to memory of 404 4228 msedge.exe 86 PID 4228 wrote to memory of 404 4228 msedge.exe 86 PID 4228 wrote to memory of 404 4228 msedge.exe 86 PID 4228 wrote to memory of 404 4228 msedge.exe 86 PID 4228 wrote to memory of 404 4228 msedge.exe 86 PID 4228 wrote to memory of 404 4228 msedge.exe 86 PID 4228 wrote to memory of 404 4228 msedge.exe 86 PID 4228 wrote to memory of 404 4228 msedge.exe 86 PID 4228 wrote to memory of 404 4228 msedge.exe 86 PID 4228 wrote to memory of 404 4228 msedge.exe 86 PID 4228 wrote to memory of 404 4228 msedge.exe 86 PID 4228 wrote to memory of 404 4228 msedge.exe 86 PID 4228 wrote to memory of 404 4228 msedge.exe 86 PID 4228 wrote to memory of 404 4228 msedge.exe 86 PID 4228 wrote to memory of 404 4228 msedge.exe 86 PID 4228 wrote to memory of 404 4228 msedge.exe 86 PID 4228 wrote to memory of 404 4228 msedge.exe 86 PID 4228 wrote to memory of 404 4228 msedge.exe 86 PID 4228 wrote to memory of 404 4228 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\83f64ca2a54110688894a30c3a3816b3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcce9946f8,0x7ffcce994708,0x7ffcce9947182⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,13918706748525901072,14136247315523727426,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,13918706748525901072,14136247315523727426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,13918706748525901072,14136247315523727426,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13918706748525901072,14136247315523727426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13918706748525901072,14136247315523727426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13918706748525901072,14136247315523727426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13918706748525901072,14136247315523727426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,13918706748525901072,14136247315523727426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,13918706748525901072,14136247315523727426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13918706748525901072,14136247315523727426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13918706748525901072,14136247315523727426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13918706748525901072,14136247315523727426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13918706748525901072,14136247315523727426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,13918706748525901072,14136247315523727426,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD59eed83a5058c9f5e152902f2bdaa5d7e
SHA11ff8c44fb91724d878be90a06eab377cb31fd3fe
SHA256809a2fd4790a415281ce1112bb3335c140d629c4de93ba0ab358d8bc4ee07c35
SHA5129515493fae9f0e77ee56e8d65adda7ef9ee7cc16ff3225e74d20132c53c797c3fb9dcc27523b1d1a02d5c9e52cbcaeb11eaa0963396321a2f40c77d2bd40e542
-
Filesize
2KB
MD5873fd5a7fa52add50f9f89397db41298
SHA12991eb9ddc3bb56708c9fdf173112da620801bf9
SHA2560398a86d62c3ae58e24b142bc5d5c0dc4d9d159b14674af1ab5c67ed217be2d5
SHA5120e78ba78c8f9c062746c45cc1ad5b148ba216d8331329d80d5f3fe084d0cdbfa217db4a9d6f1aea2f4a92479c837803162ff3471c20ba9669436530d7bb85224
-
Filesize
5KB
MD5dd9ba8a4651827eea57c39b43e7518ae
SHA12669a462d1031ddb7cb8445a10b3250270a71890
SHA256c45eb914ec9a5ed71fce1330fa1090a0dff9f01a1d45f2131ade3ee74d1b13a0
SHA512b7c674c6d5d90854a9f447d13b5f0451529e486d957099bcc32093f31afb0af111c1639008da752fe59d403807c2fb8a2dd928f77ba398a0ea7db33345747acf
-
Filesize
7KB
MD5e13f2a586c0ea84137a2ff1550dfbd7a
SHA1976a5a34121890c2e3f6e62d982ba43f009e8ceb
SHA256a338cb6a27b3905c017fed837773787c5c077700ecd436b98335273d47121a83
SHA512631b90a1bee5de6efbfaa0973e7f16d301d5d4f4e1f7a0b1417f8111185214ba683db6cd4939e0e954aa411f7a1c3b52375fb1a9c0405e7c934bffb70a8b62d1
-
Filesize
6KB
MD5abd25825d54b31b53361e76fe2f74e4a
SHA15690f7876ccdf18549845535ebb18639c336aca2
SHA256434bbe2e01e4b894b9cb72d49f5e8dd9fc33f7cbe443a10f44fe852a3bcbb906
SHA5125169b5b9a324fcb02d42f187df616128f8789bef5010e80ce1a3b57cab825df9f0153e95646245669fc9dc422c390b9e433dbba6b40fccb13f35b4fd9360b256
-
Filesize
1KB
MD52ef7a54c3788c3d87cf0890321055ab6
SHA15ea1d65fcd4577fdd99b15fa6405322d78ac468e
SHA256b0cf19daaf4fb511e215f7f99b4b21c6e28e5c35b89d7ca47a79aee00c81c219
SHA5128367192a0fb0f81f9e19835be94e06df98c318c81b1ff8f4263b665967173749b76b1d1586047f4a225d5e8af864706079ffa5051d21f197c89ddad3f0046d16
-
Filesize
1KB
MD5a9c875504d6cc99008f331564bb703ad
SHA1dab5bcdb329363362fdedb58a2b9da5ecfd379d2
SHA25602ca83bde70e3d347ba4c0468e4f2d2e5b278114bc96b68bed14eef226e5d66e
SHA5120b22dc7c1aebe7ec99a1b13c4e9228184e503a9e3df80ac2592ca8a964aa97fa2179724e7b3a47a95b3722a0d45b2a0514f509d4e71e8b9fe5936416aeafc0b8
-
Filesize
872B
MD5ff1701db852e408a748b3300ab5e46e3
SHA1dbeb27cf45c682dada7d2742180ddd71f461c693
SHA2561e418041af58a085b0077fde31ec61f0657a9fc95cf90ce157e3e68ead7dd96d
SHA512f888eb0dce0479096e2fd79f5f6aa68c9067dfa6765780ec4964e6c003957dfa4ddab4b55419d70ebcc8b9d156733f5fd33e2bccfe6fb75dc9cf383fa23d03be
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fa22843d450eb48b715b992eb862d34d
SHA1ee7443fa48468ea32dd9f270895825946c083ed6
SHA2564fc91368c8444a5044e77b8697427ba3d74116768e242db41f0132e2ea27c792
SHA512507b4e6b9d9abd7236395f232be8d500967b30feaafc20de8b0ba2b3153e0c27f8d70fb30fe480dab9b50184c83055745baacb2b5ac615950117e28222bf1477