Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 07:10
Static task
static1
Behavioral task
behavioral1
Sample
976e2cd2da36b33571d1822120b439f8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
976e2cd2da36b33571d1822120b439f8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
976e2cd2da36b33571d1822120b439f8_JaffaCakes118.html
-
Size
48KB
-
MD5
976e2cd2da36b33571d1822120b439f8
-
SHA1
c6846eae5ea52b0a63da6aa0f7155248a97cb042
-
SHA256
2931f00fa02b2d68f5af6f592e694672f3adff73549647c66a8fbba1942124e3
-
SHA512
662e60fe34285738340a327922e54d4903e2865c8bfea43dc590d2cde4b9e32fdd3fa56b4a1249354d8f4cda7bfad9873dd703a270ec8ec216cbdc87425f2c2e
-
SSDEEP
1536:iBYpBUP7zhHX/kBzvUaDRTEnozl1zrPzcvz8PVz0ATzmXpYzhozdf:iBNP7zhHX/kBzvUw9MB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 4256 msedge.exe 4256 msedge.exe 3496 identity_helper.exe 3496 identity_helper.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4256 wrote to memory of 1592 4256 msedge.exe 84 PID 4256 wrote to memory of 1592 4256 msedge.exe 84 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 3576 4256 msedge.exe 86 PID 4256 wrote to memory of 1644 4256 msedge.exe 87 PID 4256 wrote to memory of 1644 4256 msedge.exe 87 PID 4256 wrote to memory of 2340 4256 msedge.exe 88 PID 4256 wrote to memory of 2340 4256 msedge.exe 88 PID 4256 wrote to memory of 2340 4256 msedge.exe 88 PID 4256 wrote to memory of 2340 4256 msedge.exe 88 PID 4256 wrote to memory of 2340 4256 msedge.exe 88 PID 4256 wrote to memory of 2340 4256 msedge.exe 88 PID 4256 wrote to memory of 2340 4256 msedge.exe 88 PID 4256 wrote to memory of 2340 4256 msedge.exe 88 PID 4256 wrote to memory of 2340 4256 msedge.exe 88 PID 4256 wrote to memory of 2340 4256 msedge.exe 88 PID 4256 wrote to memory of 2340 4256 msedge.exe 88 PID 4256 wrote to memory of 2340 4256 msedge.exe 88 PID 4256 wrote to memory of 2340 4256 msedge.exe 88 PID 4256 wrote to memory of 2340 4256 msedge.exe 88 PID 4256 wrote to memory of 2340 4256 msedge.exe 88 PID 4256 wrote to memory of 2340 4256 msedge.exe 88 PID 4256 wrote to memory of 2340 4256 msedge.exe 88 PID 4256 wrote to memory of 2340 4256 msedge.exe 88 PID 4256 wrote to memory of 2340 4256 msedge.exe 88 PID 4256 wrote to memory of 2340 4256 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\976e2cd2da36b33571d1822120b439f8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf44a46f8,0x7ffaf44a4708,0x7ffaf44a47182⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,10037787218251968491,15580731845203135514,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,10037787218251968491,15580731845203135514,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,10037787218251968491,15580731845203135514,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10037787218251968491,15580731845203135514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10037787218251968491,15580731845203135514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10037787218251968491,15580731845203135514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10037787218251968491,15580731845203135514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,10037787218251968491,15580731845203135514,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,10037787218251968491,15580731845203135514,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10037787218251968491,15580731845203135514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10037787218251968491,15580731845203135514,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10037787218251968491,15580731845203135514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10037787218251968491,15580731845203135514,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6184 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,10037787218251968491,15580731845203135514,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD55e8baa262a2ef8d4f1316cb96ee37bda
SHA193d23c73ad4e2dbb79abddf21d7513910301795a
SHA256e86315208dcb9c77c24102a5322fd281e4e38859229fc5797fea0167b4debb69
SHA512a25d8d50311ac4beb0b546bdd6d544479da09c24cab00050ac69318db2f62f7bd50b8a656754bc8d0efd93297b8e19665fe398b6b79b62eb2500f5f5df9052c8
-
Filesize
372B
MD52206396b22c4012a1b7ad764f921c0e9
SHA18eb245d63ec17d72cc4876ff8064adab9c885467
SHA25690cb17356bb8fc677fdd2d4dcaaf38f8570f937d8e1d3f4e50e1ad68d0f27f05
SHA512fe09f9b2959e49f583db22479a07c7cd63515b810a56a09a9910cfe5379586cedf63fc62c035f08390d2ca5c7ee582ff7cb898f62d1be732b1337f0238791768
-
Filesize
2KB
MD537ebda07687d6cf5e0f42ff8f17833d8
SHA13e6267a26fd44797d0893bf791332a6a1805cb3a
SHA256c9fc4f332ad14918d1bc047483121520c3f26b33fca174ce403a7481850a9c78
SHA51255d9c581109df158d35b9b05ce63b5154dd1ec9ad180e07d4f7062b46f54f3f31fb62d328fcc2562072e1dae4264c8565ec735bbbd7ccfdbe33ce92fa45d993c
-
Filesize
7KB
MD5874f6107834113df18208f37b4772ee3
SHA1678b9eed101330e3841ec938c88bf9e2e990f670
SHA256b9ffbd1bd67a25bdaccf202705b895e177abdb630b3ffdb8ec7e293f6082da7c
SHA5122d0c475292bd4c75b42e80e0c2f5e7ba4cde7f64b12c236cee2fc64d73e5e93fc2785fb18d5c47d080454bbd134424202d719764e8ce542363db94d1406c7694
-
Filesize
6KB
MD5ff7ee9191c8172fc91b312caebc483d2
SHA1e5f75d62819b9d66df06bf64b1aa197cbbbc61c1
SHA25642e9084a22cd1871c721bdbbbc5ccd6d5e763653ec9ada1bc808694c84eeecce
SHA5121c5119779d22f791bccf7641af57e007c680797dd59444443a813a9902188680f6957853cd8a2761a2b35e28d6dd101388e137ac80d1e0625bb27c93edb0227c
-
Filesize
6KB
MD5a92f7053dec89e2b47d623652a3ed7a3
SHA1a6aed5e3066fe0f43bcefd75f67df82767dd30fe
SHA256ed618d6b3cd98966a8f5cff20dd3f6e34e9ed49e677001683da55b0b4e5edcda
SHA512f6d698c22bff9ab5a0945b0de9825d50ac931844d347ef1d7496cd6165014d74ed60c0fe8392a1ebb60612800f19a17e944c7334db6d99c82d30aed9cd462b31
-
Filesize
862B
MD5b5494f672c28eac047f35fec2fac111a
SHA19649db45146e77f2ea601182cf478c87aff2f7e7
SHA256c07fc318a29012e37a2d86b264c633572083086b24b83e1be7d149ed3c3ffe59
SHA5124f3e104af8b2c8ce815126abc5e82958a7bf39f243466bb269ed425a5568e394551cd57a0b7764ef51c1a126db51aa34b3d8f44825d7486babe1c60971da5d7e
-
Filesize
862B
MD5dee30dd7b692a88d8d076426a6e75df3
SHA169f309d086b6943f49c095e44fcbdd794f883b68
SHA2568a99b1490748f1f7f6ffbdb6286d934712843ccaf9b14a66c7afaeaf1022911b
SHA5125496cdfa701edabd9762bca583572e4a65e3c1d8cada090c26785e7dd4da395e39e41589346a4adda0e9a490e24cce0d835382c2c0e69cbf3a3632df77f112ff
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5afbf8f9169b5cb0ef4eae74db3704291
SHA1c189fb18f3468943754cff43cbc0e8547ddce7f1
SHA256805c06eca3edbe1ea8c4227f57336e22ec5c5d58f3f51258db79b4d2640dd3bd
SHA512fa331bb538214b25f2594b44773c3886c20a011718c25383c1aaa26f60d88da14d5e26268f0bfdd4d60aa98f3690c07eba8e1435cd70e2121d4baf967fea8044