Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 08:37
Static task
static1
Behavioral task
behavioral1
Sample
f31b88346a9973ba76476f3ad4452759_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f31b88346a9973ba76476f3ad4452759_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f31b88346a9973ba76476f3ad4452759_JaffaCakes118.html
-
Size
432B
-
MD5
f31b88346a9973ba76476f3ad4452759
-
SHA1
a5a3f63aaab30b2c7a4564b17530b3cf3cbef35b
-
SHA256
ebacd786b144f2ac87a0f8a110d67124be9e2873711638ad310405caec98f0d6
-
SHA512
16c75f0d4ef3cbd1ab19f4a5875821558c44635b96ceef8ccca82366cfd4cb300a7a7b5ab9cc6756443df6754c33242d38a89d513d4ac0df799c0e0273239dc3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3388 msedge.exe 3388 msedge.exe 4884 msedge.exe 4884 msedge.exe 4248 identity_helper.exe 4248 identity_helper.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4884 wrote to memory of 1748 4884 msedge.exe 83 PID 4884 wrote to memory of 1748 4884 msedge.exe 83 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 4444 4884 msedge.exe 84 PID 4884 wrote to memory of 3388 4884 msedge.exe 85 PID 4884 wrote to memory of 3388 4884 msedge.exe 85 PID 4884 wrote to memory of 4528 4884 msedge.exe 86 PID 4884 wrote to memory of 4528 4884 msedge.exe 86 PID 4884 wrote to memory of 4528 4884 msedge.exe 86 PID 4884 wrote to memory of 4528 4884 msedge.exe 86 PID 4884 wrote to memory of 4528 4884 msedge.exe 86 PID 4884 wrote to memory of 4528 4884 msedge.exe 86 PID 4884 wrote to memory of 4528 4884 msedge.exe 86 PID 4884 wrote to memory of 4528 4884 msedge.exe 86 PID 4884 wrote to memory of 4528 4884 msedge.exe 86 PID 4884 wrote to memory of 4528 4884 msedge.exe 86 PID 4884 wrote to memory of 4528 4884 msedge.exe 86 PID 4884 wrote to memory of 4528 4884 msedge.exe 86 PID 4884 wrote to memory of 4528 4884 msedge.exe 86 PID 4884 wrote to memory of 4528 4884 msedge.exe 86 PID 4884 wrote to memory of 4528 4884 msedge.exe 86 PID 4884 wrote to memory of 4528 4884 msedge.exe 86 PID 4884 wrote to memory of 4528 4884 msedge.exe 86 PID 4884 wrote to memory of 4528 4884 msedge.exe 86 PID 4884 wrote to memory of 4528 4884 msedge.exe 86 PID 4884 wrote to memory of 4528 4884 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f31b88346a9973ba76476f3ad4452759_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ffffb9046f8,0x7ffffb904708,0x7ffffb9047182⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,7324011243006776516,3013295829405731730,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,7324011243006776516,3013295829405731730,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,7324011243006776516,3013295829405731730,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7324011243006776516,3013295829405731730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7324011243006776516,3013295829405731730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7324011243006776516,3013295829405731730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7324011243006776516,3013295829405731730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7324011243006776516,3013295829405731730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,7324011243006776516,3013295829405731730,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,7324011243006776516,3013295829405731730,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7324011243006776516,3013295829405731730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7324011243006776516,3013295829405731730,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7324011243006776516,3013295829405731730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7324011243006776516,3013295829405731730,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7324011243006776516,3013295829405731730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,7324011243006776516,3013295829405731730,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
Filesize
360B
MD56e1943f5a783b2412c667b828592af5c
SHA1983becf61c44577a68cbc6f75993f411a46884d7
SHA256934af73b3ef7ca400e625fbd37cdbe89439c25a5fd7349c206a82b99f3d61969
SHA512e397286603cce28ee158163246d9a788ba47c4fe340e5825f9b4b0fd7154f77663f6235bbe5e8adf18a4e1a576260186b4e29b4223c6a7f82e801fbc74351175
-
Filesize
6KB
MD5a0a581bd10bb0fd772f84e4edef297f4
SHA1b0d5447936e84fc2970dd1b896c6f9b5add8fa22
SHA256cfa87726bc56771fcaa9a50f909d47fc09b7aeff144492e21bb55d49bb2f2d27
SHA51257ab1f2fabe7cfd617958bcbc5106219598142bffd45ba1180723142b3972f08b753740281fd3ac930945121037b088476aed96327291cdf780fe9cb24d7af09
-
Filesize
7KB
MD55a6ebb4b89aee308e72f9681ffdbf8bc
SHA1f7f1a68ccc55ac5f006dbefaa7422066fee23a3d
SHA25679562077818ba485688e60c3a80ea9828d1b2e3de5d1df87773e28f89ec75695
SHA512daaeab676389481cf606958ce3c0a888b4f0f5641a1f414ecde4f327c7f6eed9f14b9d069c51ebafb8c592de3a05e1c06409eee676dbdbae6ca60104cfde744b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD594b53e88cc82b8c61b3a99df04470c44
SHA1c27380c75ddf5a59b6317a5f4c5498312659bbb6
SHA256f1cfb94a092b7cdd03e5112a6de809cde5520b9a453bbdf28b9d9b5ab7565550
SHA512bfa0ea1882554ccf4e676ffe7703f60ae909141f48d7a55e3ee0fd2729e36a1291e4780f1476dcd66cc3231dd0c2231ea5e23560a5ac11f7b2549dd86f8ade61
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57882b.TMP
Filesize48B
MD5dd42ba5fc079377e0d0d41555aa7ea5e
SHA1b833130f272938b62cc5c1f0f506e1b09c4c9246
SHA256ef4c84397b58a92f6a21ec2d71970f261cb3af988429721fb479991b8d23988b
SHA512f85230ff022939e43d311ef1e86c7005919f7799cfc62e2e0b0c783464947d4ac5c6616a4f7b703a1709f708853be4898a7235a33764fe8ff5aa3983fb933a0a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54f22208871db2315ba4a1edd60d70882
SHA10022126a84e7fc98548873cbc90da829607c5952
SHA256593047527f1402fa8ec520e23341ae92176a29c550bfb178474aa852871f1500
SHA5123870e7f20fcd3baca57c7d5df29699db927856818b94aded8dcbefe6ab15cc52189be6c12794364bbc050a144117c64daeaa94f1800640096697d6c628e504fe
-
Filesize
11KB
MD5e343efaabc11e2a1e386b72e8e9326c1
SHA12f941065e1d81246ccf85fff1c9ec800144cb830
SHA256e8698c019e2f4bf7eec31071ae1beb0fc2c409bce42585c534b1314a9413eea8
SHA5126bb07dfc7c2bcc81624048950430db6bd8a6a7061c86f7977c14c39aa15d6591cedcad4a1992c5481a5a49e2645b558078b6c4355d8014f209494e1761bd038b