Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
fecbdaa0c65df4f83a4dba87c274fb23_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fecbdaa0c65df4f83a4dba87c274fb23_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fecbdaa0c65df4f83a4dba87c274fb23_JaffaCakes118.html
-
Size
432B
-
MD5
fecbdaa0c65df4f83a4dba87c274fb23
-
SHA1
b538884bffccb730132965aa514b99aec24dd16e
-
SHA256
2dc7109cf139389849b0b904bc532423721f85dca09a3166cd2e29683a4d393e
-
SHA512
d46f7c5bdf6af3338edf310d4c49bef426a01cdf2b1ab6e6ceaef0f36543f271c93839adde705b8efe77f95288da2690d043fbfb48ef1ec9ef0da6c009e7a2d0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3084 msedge.exe 3084 msedge.exe 348 msedge.exe 348 msedge.exe 3676 identity_helper.exe 3676 identity_helper.exe 6016 msedge.exe 6016 msedge.exe 6016 msedge.exe 6016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe 348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 348 wrote to memory of 4656 348 msedge.exe 88 PID 348 wrote to memory of 4656 348 msedge.exe 88 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 1968 348 msedge.exe 89 PID 348 wrote to memory of 3084 348 msedge.exe 90 PID 348 wrote to memory of 3084 348 msedge.exe 90 PID 348 wrote to memory of 3172 348 msedge.exe 91 PID 348 wrote to memory of 3172 348 msedge.exe 91 PID 348 wrote to memory of 3172 348 msedge.exe 91 PID 348 wrote to memory of 3172 348 msedge.exe 91 PID 348 wrote to memory of 3172 348 msedge.exe 91 PID 348 wrote to memory of 3172 348 msedge.exe 91 PID 348 wrote to memory of 3172 348 msedge.exe 91 PID 348 wrote to memory of 3172 348 msedge.exe 91 PID 348 wrote to memory of 3172 348 msedge.exe 91 PID 348 wrote to memory of 3172 348 msedge.exe 91 PID 348 wrote to memory of 3172 348 msedge.exe 91 PID 348 wrote to memory of 3172 348 msedge.exe 91 PID 348 wrote to memory of 3172 348 msedge.exe 91 PID 348 wrote to memory of 3172 348 msedge.exe 91 PID 348 wrote to memory of 3172 348 msedge.exe 91 PID 348 wrote to memory of 3172 348 msedge.exe 91 PID 348 wrote to memory of 3172 348 msedge.exe 91 PID 348 wrote to memory of 3172 348 msedge.exe 91 PID 348 wrote to memory of 3172 348 msedge.exe 91 PID 348 wrote to memory of 3172 348 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fecbdaa0c65df4f83a4dba87c274fb23_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5e4646f8,0x7ffa5e464708,0x7ffa5e4647182⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6093657354820563699,9837153684522138450,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,6093657354820563699,9837153684522138450,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,6093657354820563699,9837153684522138450,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6093657354820563699,9837153684522138450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6093657354820563699,9837153684522138450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6093657354820563699,9837153684522138450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6093657354820563699,9837153684522138450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6093657354820563699,9837153684522138450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6093657354820563699,9837153684522138450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6093657354820563699,9837153684522138450,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,6093657354820563699,9837153684522138450,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,6093657354820563699,9837153684522138450,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6093657354820563699,9837153684522138450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6093657354820563699,9837153684522138450,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2176 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6093657354820563699,9837153684522138450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6093657354820563699,9837153684522138450,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3404 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d94406b964753cc5222ab1343f54bb1
SHA1a5e7de0781fa1fabb3cd89564f2e5693cb4dee16
SHA256fd9923a217cd8d2c44a63dbfe52ec262e7c80b1f1e50c6e0f21f8379c90e7762
SHA5121ad2c144e7bbd809f400f8782586d3768fc82bcef39db986f766897c344efec77ab2c0b6d9c5ee2019ef5cf9ad0c46bdd25392cbc9dbf9ea80e800577f0fc598
-
Filesize
152B
MD549dde89f025a1cce8848473379f7c28f
SHA1b405956b33146b2890530e818b6aa74bba3afb88
SHA256d6d125ba686b825bb22ab967a346051780cab1f55fc68a2f3efdf3fb5598f96b
SHA51253050344674d8886db66e25f42d97bf46b26229972631f857286c2a303897cda58d85ee8ca768bbfb1fc07e52567315ea85d57e39b5b382916700ec389946506
-
Filesize
360B
MD56e1943f5a783b2412c667b828592af5c
SHA1983becf61c44577a68cbc6f75993f411a46884d7
SHA256934af73b3ef7ca400e625fbd37cdbe89439c25a5fd7349c206a82b99f3d61969
SHA512e397286603cce28ee158163246d9a788ba47c4fe340e5825f9b4b0fd7154f77663f6235bbe5e8adf18a4e1a576260186b4e29b4223c6a7f82e801fbc74351175
-
Filesize
5KB
MD5bf896081a1829648394121533b6b6b4d
SHA16143940c509779089a1a6572e9072f1fb307bab0
SHA256e264548dab2897a1622f18dfcc5dda2d1b8ce074dbd31f38f2966788caf9776e
SHA51258c0554211e46e99fffe22a4c75229911270e9928ff47213c6d4065b949c68aae9fff8833749419a3921a222e18189b12dc738a265f92f61620e9b620aecc2be
-
Filesize
6KB
MD5e61efc1ceac310c6a7defc048de9c607
SHA1d0503c4772b21fe9e85011e9d175d098c6e17198
SHA256967bcd89408c7b6464e8c62de7576717f0c928a5bf0fc96f419637cd24466ac3
SHA5126913de6b97b7d25b182feae11dc806ea93dae1cb7c4a412c16aac861c4d8e9dbddaa9375aeac4ef9c4567eb436eef598ca1f9d324b39d80c0bafed7462267ab2
-
Filesize
24KB
MD57c43199d1e5acf5a31e1cbef990fbc47
SHA1df7bd524b9b3175325c0aff3469ea7f2211d3061
SHA25652a6fd2a2fff53c738c77a6385e7e1677f8990781699f78c63d5a4b0fe566d22
SHA512aae886642b40ffb0676534fd85abe43ab588526b8e952b12a1bcafc73cb05103c76aee4fa32cc18c74af6c59aa1dc84bcda09ebccb7d11adc79fee3bfc93e2d1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5524a8e1509722610b3ab787ef7d06953
SHA1739ed2af32f3d6e9d42f335922d8aa4d36aa12cf
SHA2569b9bd855b253f6959b381508621c85f80c417ba2d55047cdf446c1fc8433b082
SHA51298df5eac3cd3676b5ba025ac1f5dea348390088a3d8e6d71a7f23787398858d25c863e1a0bdd74a4acb0cf5ef4dff9d92d8765ed5cc910a1cb52dbd22255b6b8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5882a8.TMP
Filesize48B
MD5f240da2edcd5e0784883e3e3f712b5a8
SHA19e8e59693d04086ae51204c0b8f8043f1d73af68
SHA256a07505d3226e3155a085ed4d85359f012fbc98317df962081ff1ed137ffb030e
SHA512dda606a050177752789f48b696b29db3fadbdb19d4586a4b38f358ed25221573a159f6d9761938f7543feba128cb96bbe2acbe6a2297a4feb29fe3f245ba78d7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD576908afe3e0a5039e91c252c32828d5c
SHA1cf3289b51f40e71a9388233f311c49b842ba73d3
SHA25607d99e25926bfda90b1f5965bbef2ba336795e38ade088b25de07160b42770da
SHA512a862a28fbc57415ab84f9e0114fd2a7b0990ce62af41e119e71a20e50966219680e08d8cde00e2d753defb03e0b2fe797013e918f440381035ebe111f76aa327
-
Filesize
11KB
MD53eca392a511c538de586b7674bd6719d
SHA1f944c98489b95e30692512576e473b9d341de61d
SHA256c885b70e1d44a56a2ffa0e4d40ea6ef680d1eeaaf86e94dacd32a6a88bcb04df
SHA51216d2e7561565d92823fa6104da8c690f11e179bd71149840d05a05fd544e7641bc3b83ab6cc016a8bee6e7031759cd9102581833d4aea6b5a35980c52bee5991