Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 00:40
Static task
static1
Behavioral task
behavioral1
Sample
825ecd0a9a2b30ff4ec32f51b9910a4d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
825ecd0a9a2b30ff4ec32f51b9910a4d_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
825ecd0a9a2b30ff4ec32f51b9910a4d_JaffaCakes118.html
-
Size
57KB
-
MD5
825ecd0a9a2b30ff4ec32f51b9910a4d
-
SHA1
d3f839a6ab48e5c49bc51b7f179a12eb9cadb084
-
SHA256
91ba1c53b7f7ff73e8b1091b68ee8bbd93c043957ca532bec2a9a8e3ee23fea7
-
SHA512
ea81ca6ba23afdf883b4f49dbc935b0a8bd2c688bbd5b0515b2016a640d879af4f2695e2cfe64ecc62c06f3d12e608fef8a8648a66c0c9d984fdeb238247fc4a
-
SSDEEP
1536:ijEQvK8OPHdsASo2vgyHJv0owbd6zKD6CDK2RVrohAwpDK2RVy:ijnOPHds22vgyHJutDK2RVrohAwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2616 msedge.exe 2616 msedge.exe 1452 msedge.exe 1452 msedge.exe 3236 identity_helper.exe 3236 identity_helper.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1452 wrote to memory of 1552 1452 msedge.exe 83 PID 1452 wrote to memory of 1552 1452 msedge.exe 83 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2792 1452 msedge.exe 85 PID 1452 wrote to memory of 2616 1452 msedge.exe 86 PID 1452 wrote to memory of 2616 1452 msedge.exe 86 PID 1452 wrote to memory of 2548 1452 msedge.exe 87 PID 1452 wrote to memory of 2548 1452 msedge.exe 87 PID 1452 wrote to memory of 2548 1452 msedge.exe 87 PID 1452 wrote to memory of 2548 1452 msedge.exe 87 PID 1452 wrote to memory of 2548 1452 msedge.exe 87 PID 1452 wrote to memory of 2548 1452 msedge.exe 87 PID 1452 wrote to memory of 2548 1452 msedge.exe 87 PID 1452 wrote to memory of 2548 1452 msedge.exe 87 PID 1452 wrote to memory of 2548 1452 msedge.exe 87 PID 1452 wrote to memory of 2548 1452 msedge.exe 87 PID 1452 wrote to memory of 2548 1452 msedge.exe 87 PID 1452 wrote to memory of 2548 1452 msedge.exe 87 PID 1452 wrote to memory of 2548 1452 msedge.exe 87 PID 1452 wrote to memory of 2548 1452 msedge.exe 87 PID 1452 wrote to memory of 2548 1452 msedge.exe 87 PID 1452 wrote to memory of 2548 1452 msedge.exe 87 PID 1452 wrote to memory of 2548 1452 msedge.exe 87 PID 1452 wrote to memory of 2548 1452 msedge.exe 87 PID 1452 wrote to memory of 2548 1452 msedge.exe 87 PID 1452 wrote to memory of 2548 1452 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\825ecd0a9a2b30ff4ec32f51b9910a4d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0a5546f8,0x7ffb0a554708,0x7ffb0a5547182⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,6585210552333363849,16436887169010038536,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,6585210552333363849,16436887169010038536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,6585210552333363849,16436887169010038536,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6585210552333363849,16436887169010038536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6585210552333363849,16436887169010038536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6585210552333363849,16436887169010038536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6585210552333363849,16436887169010038536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6585210552333363849,16436887169010038536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6585210552333363849,16436887169010038536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,6585210552333363849,16436887169010038536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5956 /prefetch:82⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,6585210552333363849,16436887169010038536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5956 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6585210552333363849,16436887169010038536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6585210552333363849,16436887169010038536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6585210552333363849,16436887169010038536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6252 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6585210552333363849,16436887169010038536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,6585210552333363849,16436887169010038536,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2604 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51177a50f9bc98dc9c4919750d184b3c2
SHA121ae44055ee1198c45555082f9b0b532cc103605
SHA256bfae7afb6f7977f91e3e80d520ee429a162667fee52dcbf0b43026f53ee3874b
SHA5122cc5532ee3eb3edc1a79a63799f9606990f959aa83b11904f06b9fa063045cce64b4d29a2ac76fc03fdf7df2451606adf14d03fe58f0499a3abb70c441ac6f03
-
Filesize
152B
MD562fb7b4e610b65d04313440f9f100db6
SHA103719b095aa5bf869ab4e3eb980d2bd882a35050
SHA25651479fa5b853161fe08d1cafaf0f91651adc59086966c94bb67546e39d3cd678
SHA512a4d4341fd7cb7dfd61fe7f0bc56d18cf2359b99890a8d0ab77b1fd76851f446e2b907c750853b71664a14480a37f7345beed2075015753c5a6185160fe50f0ab
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD565323617b095636d96e5a9ab97611a9b
SHA18948c3f1c259ab411cb2e1fa57fc944d972b9a9d
SHA256bf0cfa5ed3a2af71ab1f2e4c5996c4ec1c49e8b2f67da138f6a854e61ae9fa1a
SHA51251f9ac0620ccfa2bd84ac731603b0bf82a57217a6a76c63389b936be4a8f181c326196f0fb2e5f95784b6fd3686a847bb74396054eafba1f41d076da9fbff686
-
Filesize
1KB
MD5331a309832ad14b48edd50bbe8bfd50a
SHA1d85ebafca208aa1797c0d5b389a7a8e8b8c9787b
SHA256464cd745c88670b87d428290971674b4959e7eddc283677bb16d7a01458d188b
SHA512536bc574a80c094b055324597560c358a21584f34225427d83db3c034b7f67e09d8bd072c5f5f7ce0846e7e3f49f19c830fcb59548797b247b9f507638523590
-
Filesize
5KB
MD52f226ee2aea33a57d9d1fc2ddd823d7e
SHA13e24289834c1ecb6a9f7cbd28a474bfd2e5c0944
SHA25687b1bb7fdb703b5f76971b34667dfa57a883a7dbbd87a2d131e820519a359961
SHA51201997a960f0a85e924161422ad3401093e66f9b29f7c87e29e4f58a9124281d8b950a64513470254633bd26a5313224e55f74af7271eaf783d0d714da702d36d
-
Filesize
6KB
MD53c630a0e5031bb7b34fd691fededb11b
SHA1a590e9c6a411f5fd218bee0de4f1b625972345e0
SHA2560882d72d0544504dd4621c311548ca7c15164a036726867d49876a96bb775f09
SHA512a4399e452e732aef35b736549755e930f9a1f311be6ec1311a2ec37989b03988ae2ead6f8f8658985867bf6ceea2b098d411ee717e59b29b04ee7b1307cbeaa6
-
Filesize
24KB
MD5d4b00b536f5f0a085529b7986e6bb2d2
SHA1939ce002f522536c9805f1c0d69a255503fd6bea
SHA2569f5592b0a3cc461f64b6863457754679e84b3569ecdc47f296c164af7441ebf7
SHA512e2fe20c702e1a388b810bdc416438b84e390e145065313651830ec06598fec1218c870bcc6ea33f363a160d47953dd42189d20fb64e2a8734555230c76c71219
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5f21ffca8f68c133d37dd3770eb8cf745
SHA11f031ab4744d8860c42f5da0459914e04798ec4f
SHA256e486a1b6236d85f7c108d49d142f1ab995b0cbfd9540950d42d030cbdfa705eb
SHA512536ceb3c953c09290b542f1fe2fe319463131e11c950f156f35306e399271adcd016f3c3c2285ba779014fb9aa84492d5ca2adbf68847fe15f81b3d033d38888