Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2024 06:48
Static task
static1
Behavioral task
behavioral1
Sample
0037f5c11a57021875c8f4d32aa82e39_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0037f5c11a57021875c8f4d32aa82e39_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
0037f5c11a57021875c8f4d32aa82e39_JaffaCakes118.html
-
Size
131KB
-
MD5
0037f5c11a57021875c8f4d32aa82e39
-
SHA1
0527c94cd9d6c8a644eb11bed6f7eff7df9a4e5f
-
SHA256
7b9d9e555377f6cf95dc6e219ba4d85f1402be1d922f947cfacccaf814759eb0
-
SHA512
c6bf1788d31e97f4f85b5df7fa9c2fff023a8092022098b92c07617c1efd6d99df944dd18f546d41116afa68474d6af951e91d7661baec00a0a0a54d63aa7c6c
-
SSDEEP
1536:8BxaPM4Ny0yPNydmGvPrd8AdCcD33pu4EAvr4CV26ARURSTkMVXRcCje9wETjYfp:8uNy0aTpsi/cE8CKhVk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2492 msedge.exe 2492 msedge.exe 4748 msedge.exe 4748 msedge.exe 4132 identity_helper.exe 4132 identity_helper.exe 5948 msedge.exe 5948 msedge.exe 5948 msedge.exe 5948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4748 wrote to memory of 3664 4748 msedge.exe 85 PID 4748 wrote to memory of 3664 4748 msedge.exe 85 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 812 4748 msedge.exe 86 PID 4748 wrote to memory of 2492 4748 msedge.exe 87 PID 4748 wrote to memory of 2492 4748 msedge.exe 87 PID 4748 wrote to memory of 3464 4748 msedge.exe 88 PID 4748 wrote to memory of 3464 4748 msedge.exe 88 PID 4748 wrote to memory of 3464 4748 msedge.exe 88 PID 4748 wrote to memory of 3464 4748 msedge.exe 88 PID 4748 wrote to memory of 3464 4748 msedge.exe 88 PID 4748 wrote to memory of 3464 4748 msedge.exe 88 PID 4748 wrote to memory of 3464 4748 msedge.exe 88 PID 4748 wrote to memory of 3464 4748 msedge.exe 88 PID 4748 wrote to memory of 3464 4748 msedge.exe 88 PID 4748 wrote to memory of 3464 4748 msedge.exe 88 PID 4748 wrote to memory of 3464 4748 msedge.exe 88 PID 4748 wrote to memory of 3464 4748 msedge.exe 88 PID 4748 wrote to memory of 3464 4748 msedge.exe 88 PID 4748 wrote to memory of 3464 4748 msedge.exe 88 PID 4748 wrote to memory of 3464 4748 msedge.exe 88 PID 4748 wrote to memory of 3464 4748 msedge.exe 88 PID 4748 wrote to memory of 3464 4748 msedge.exe 88 PID 4748 wrote to memory of 3464 4748 msedge.exe 88 PID 4748 wrote to memory of 3464 4748 msedge.exe 88 PID 4748 wrote to memory of 3464 4748 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0037f5c11a57021875c8f4d32aa82e39_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff981f946f8,0x7ff981f94708,0x7ff981f947182⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,7327195586879271147,7525356461550751857,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,7327195586879271147,7525356461550751857,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,7327195586879271147,7525356461550751857,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7327195586879271147,7525356461550751857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7327195586879271147,7525356461550751857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7327195586879271147,7525356461550751857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,7327195586879271147,7525356461550751857,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,7327195586879271147,7525356461550751857,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7327195586879271147,7525356461550751857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3048 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7327195586879271147,7525356461550751857,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1828 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7327195586879271147,7525356461550751857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7327195586879271147,7525356461550751857,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,7327195586879271147,7525356461550751857,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e36b219dcae7d32ec82cec3245512f80
SHA16b2bd46e4f6628d66f7ec4b5c399b8c9115a9466
SHA25616bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b
SHA512fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c
-
Filesize
152B
MD5559ff144c30d6a7102ec298fb7c261c4
SHA1badecb08f9a6c849ce5b30c348156b45ac9120b9
SHA2565444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10
SHA5123a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5e88a6924d2cb671e7cdf79197f878a4e
SHA11f7854b457ca33c7764620cfcc0dff6d7057ad86
SHA256b9f2530e55ec75cae4eb54254ff3772d9f92292b2e14425b8e9b282c926675ca
SHA5127ef85fe10591e3f1bf011542baf12f67f37093bf36aac2244b34efa8595a1ea47dd5950a911280d06d7fdfb6cedcbed36ae62df9ec64f1723fad59a5167e2e30
-
Filesize
2KB
MD53c2374a4887eb38fce837d2017dc5582
SHA12e8fea3e48f5d5cfa4c0b5a642e5b998e3b1a06e
SHA25657bebc7f1559454f556aa95611eafd2964fa3717c6100d325979f9c774c5c225
SHA512de5982c771554ba7772e73ccbbd35f5ab4a5f4eab187318fa03df4c04755bfca72f7b4b39cf0df8587fd42c6d21146864adf24574469fa6062c90f8d8d6ba631
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD5ace9d96b921077b1576251e2957fc50d
SHA134c7e4d1eb16615178eedbd00568a1e9e6fed940
SHA2565fe0c61a614cdf966b6a281cacdddacec4b42d4489a7be70a9c624a9e55a0c92
SHA512f2cfeef72be0f646f792dbe43e7da5a89ebf1df37381694cb76173134365af53cebe23a7f2ba304cf17c87af7d24840a3e3b3f8b7010a01cd9c1de9de59a9057
-
Filesize
5KB
MD58a9aeaaadbc30334670e97ca105e775d
SHA15520be65eb2b49791e17eb9ef7575037545247b0
SHA256f4f6dd25685e5503c09dba413da555eeac4cc0e1d4b1ea1e2088b49ecbc377dd
SHA512a873ff56ac90aee30b1786226bc988a3a3133517ae07dbecfd9ac323f624dbb1125e438e3a07e2b6ee69a45e95dbd733bfab07a1cf189c6167c1d09e47b51a78
-
Filesize
7KB
MD5c73de112998994d736be26e78709ad1e
SHA1a1fcd8affe496ad7afcb80f0b43625094d4b2c74
SHA256ecee475d62e0675055bd862c2f16bd8138a86c1e8a29fe842b7d7b7d3e6985a0
SHA5120210a063cdce71bef9682e7aa2aa4ff54f2ea7029b4d12b6e1ea6598b191beaf7b9f481247ac65d8b5cb849823bc510f7479afd7d72b0c522f725012257dd961
-
Filesize
6KB
MD5981eaadb6e2fb388ff198b0920be509b
SHA1b85776f335ad90ab8caa9d649465e636282978ad
SHA25605fe83cb926192eab156759a180a3c20d3bcc79ee8285295d3498f5130c58b29
SHA512a57d5f6935f267cb4428beece38e483c9b6111314b0844fd9acf6728a193a36ae02f52710ae0b62c8c8fbbc2715c91fad1b467ffc92f840cfb610f09991a2910
-
Filesize
539B
MD5c1f24ee04302c5450a8c77c1aef5db70
SHA12720262b6d0ada9649adb2d8dd4a6cd6eab0e325
SHA256a571baae43c7254b0e8d39fcee19ee4860338ff83b4658c7ccbc17050b94a32d
SHA512b32f25876c337060c1d41fefd4550181b133e5fc8dcfe2b7c277620aa1fee93417366bfff1f3fcc64495fb7ea3e4141818742cdb5b13e4ca6da20458f62ecb8a
-
Filesize
204B
MD5a28cb1164bf5ac82e298702346ce6089
SHA19218a9620509805658d82b94188182f587eb0260
SHA2562c711e6a0e52ecf5b065fe1eb9cda5d2d411bc9f2cec7537b2b550675c5dfddd
SHA5121511635e07c433b608ff9abaabb4e6aa15cf756d380be82a645c1195833e496fec1694f985a028bb9fa4d6248490c365174ad219b78eddcc172369e771769335
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fea3a1a492064cdd5fed41d5c5e37f01
SHA1dd28d9d1f7699bfbc3de420c0a7ee88957264fdb
SHA2564822fd9d6c3adaff366d4e6f3ad106c180718a3b3885407c6e5ac990542b8b9e
SHA51245b96b095c128e71e904068816b0ea125723b0697a5cedd59236eae7700c1bb4ab2b4d2298a9c2abb779152ea17153f4a79159ddca31140eb133aa3cdcfa8bea