Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 00:47
Static task
static1
Behavioral task
behavioral1
Sample
f6eebc38079d863bade92df868a3d0fd_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f6eebc38079d863bade92df868a3d0fd_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f6eebc38079d863bade92df868a3d0fd_JaffaCakes118.html
-
Size
432B
-
MD5
f6eebc38079d863bade92df868a3d0fd
-
SHA1
efb497980594a1555a24c9a483dcfbb93deee6ed
-
SHA256
8a528c579d956b14a6d361304c88741e5c46d7271a8d9623fe9d4db6f70edabb
-
SHA512
b868b1c89cb2348ea2be9a2972186b206558d762c5ec5e51b536926bdbe7770ccad60c3f4729219b7a013b757390c2936b77029427a54f40fc7115f05fd643ac
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 728 msedge.exe 728 msedge.exe 1988 msedge.exe 1988 msedge.exe 4816 identity_helper.exe 4816 identity_helper.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 4348 1988 msedge.exe 84 PID 1988 wrote to memory of 4348 1988 msedge.exe 84 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 4812 1988 msedge.exe 85 PID 1988 wrote to memory of 728 1988 msedge.exe 86 PID 1988 wrote to memory of 728 1988 msedge.exe 86 PID 1988 wrote to memory of 752 1988 msedge.exe 87 PID 1988 wrote to memory of 752 1988 msedge.exe 87 PID 1988 wrote to memory of 752 1988 msedge.exe 87 PID 1988 wrote to memory of 752 1988 msedge.exe 87 PID 1988 wrote to memory of 752 1988 msedge.exe 87 PID 1988 wrote to memory of 752 1988 msedge.exe 87 PID 1988 wrote to memory of 752 1988 msedge.exe 87 PID 1988 wrote to memory of 752 1988 msedge.exe 87 PID 1988 wrote to memory of 752 1988 msedge.exe 87 PID 1988 wrote to memory of 752 1988 msedge.exe 87 PID 1988 wrote to memory of 752 1988 msedge.exe 87 PID 1988 wrote to memory of 752 1988 msedge.exe 87 PID 1988 wrote to memory of 752 1988 msedge.exe 87 PID 1988 wrote to memory of 752 1988 msedge.exe 87 PID 1988 wrote to memory of 752 1988 msedge.exe 87 PID 1988 wrote to memory of 752 1988 msedge.exe 87 PID 1988 wrote to memory of 752 1988 msedge.exe 87 PID 1988 wrote to memory of 752 1988 msedge.exe 87 PID 1988 wrote to memory of 752 1988 msedge.exe 87 PID 1988 wrote to memory of 752 1988 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f6eebc38079d863bade92df868a3d0fd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8963946f8,0x7ff896394708,0x7ff8963947182⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,3365331026367528355,14767697124714955442,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,3365331026367528355,14767697124714955442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,3365331026367528355,14767697124714955442,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3365331026367528355,14767697124714955442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3365331026367528355,14767697124714955442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3365331026367528355,14767697124714955442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3365331026367528355,14767697124714955442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3365331026367528355,14767697124714955442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,3365331026367528355,14767697124714955442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4236 /prefetch:82⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,3365331026367528355,14767697124714955442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3365331026367528355,14767697124714955442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3365331026367528355,14767697124714955442,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3365331026367528355,14767697124714955442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3365331026367528355,14767697124714955442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3365331026367528355,14767697124714955442,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,3365331026367528355,14767697124714955442,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e36b219dcae7d32ec82cec3245512f80
SHA16b2bd46e4f6628d66f7ec4b5c399b8c9115a9466
SHA25616bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b
SHA512fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c
-
Filesize
152B
MD5559ff144c30d6a7102ec298fb7c261c4
SHA1badecb08f9a6c849ce5b30c348156b45ac9120b9
SHA2565444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10
SHA5123a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04
-
Filesize
360B
MD56e1943f5a783b2412c667b828592af5c
SHA1983becf61c44577a68cbc6f75993f411a46884d7
SHA256934af73b3ef7ca400e625fbd37cdbe89439c25a5fd7349c206a82b99f3d61969
SHA512e397286603cce28ee158163246d9a788ba47c4fe340e5825f9b4b0fd7154f77663f6235bbe5e8adf18a4e1a576260186b4e29b4223c6a7f82e801fbc74351175
-
Filesize
6KB
MD58f789e7bfe7c2df575891ad9c516cb5b
SHA17acfb7a0a6cdc3edb2d5e49933eef5b2076e2447
SHA256bca7de5e84b550ac4508efe4cb02351f8876f5933760906c2e9567b43a64343f
SHA512d2fccd628d129d93fc17142b7ed9327824767eaa5a9a6685e946c9a85964d4cc89fdbf5244dfb048690826d5beb54c6fc8da7c413264535a1ae4d3eac54931ac
-
Filesize
7KB
MD5f674ef90eb89385a76a081a85eaf789b
SHA1a55fd83f5c19b1653cd96f7cedee50800ea4ccb1
SHA2563b929e8cb046144280c55892594192b2ebb1d0d3192cad5c2f5faf14d8a0ca12
SHA51281b8858aac84a9e45dc919f768f09dc347f350cccd6974de8fed86c25725b3ec32b94e91ed0739137457fbe0d2e1b33f21d6a5ea27e1acbe8a2e314ca9c871de
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD585f1803044e1389bdfd36b8fcba132b2
SHA1d615b0159b2731db0d2bf6b896f974c05007341d
SHA25667a9926bc61ff32ba6808221a13eaa90c110c96242d8c2a969ae1c25cb5350b3
SHA51212c1fde1c3ade3b4106faf38416a40a4c822eef40c95347e0832a88b7157c0e5359dc968aeff87c3165856f7c6cf6e3ecbf19c0ab54d695e3861c4244d56ddc7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57a44e.TMP
Filesize48B
MD50761cbbe5e84449bd6a8789cedf82279
SHA151f0d9aea5b45c1183a0c43990fa81ee7deaa8ad
SHA2561cc7f0f8f468308ff39ec4e7e48bdaa8bc0c41e4b09624627f8f2e4a8bb5d15f
SHA512df48cecc55b1b28ec09eb8b853d60b95c87809e407e63b294002bf6894c72d488d7072453b461a6681d8eddf94db1ea14454600904c366308c8533a5aa3510e8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d3a0a7ff8c1c3097a2cc3fef611bd9ce
SHA12ae8f99305e96a7bd87f906ae4d0d833cb400932
SHA256c7c0c570dea3f9f205c16a3c73015729f10d28866fd81e51d4526cd2f5a64fc0
SHA512fc71f5334191e173d1617ebc830aa83fc61214a95e473fea4917c3fb6868e31b00bb144973a34a60fea967189bb07055c7da8a3bb0bb8dcc43a2ee45270e53f4
-
Filesize
11KB
MD5c4e956db008b0c2a285de3d13f4f67a7
SHA139940bacb2b60e47b19fca9c61e46852723daddb
SHA2562d7c6ac91e3ec55f1d53e1d1ae6fcb1559337e1ad27c4aa4cfeb26eba683adca
SHA51213c5436aa35b44441908f903f725551d98ee8cf836ddc94bc7c79c4fa0867d63546504276a1e508ca6b7f81934787ff92c5e210f138f07c8db4041f501cfca3c