Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 08:25
Static task
static1
Behavioral task
behavioral1
Sample
4f278b1cff0afc318ea23f3a777baea2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4f278b1cff0afc318ea23f3a777baea2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4f278b1cff0afc318ea23f3a777baea2_JaffaCakes118.html
-
Size
46KB
-
MD5
4f278b1cff0afc318ea23f3a777baea2
-
SHA1
b8b51e214dbd6c116f79543f5a56fa8229b77a82
-
SHA256
f8d329fb5c8bb7b0154877d2fdecfe9007b96747f39886f41b6412342111d9cc
-
SHA512
ca25abc3f4becc290dfce08426c298f61da73b33186f2a77ab86f7c26b92af91dc4c34b6ead92f78e896af4be961c904eb83972c289d88c50dd21056f8dcdc6d
-
SSDEEP
768:1of38uiYn5YIuFuoT2WHm/KpCbARSSkfMfrc7ADhFY2S6AA:1of38VYnmFRT2WHfpCbARSHfb7ADhFuA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 5004 msedge.exe 5004 msedge.exe 1552 identity_helper.exe 1552 identity_helper.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5004 wrote to memory of 216 5004 msedge.exe 84 PID 5004 wrote to memory of 216 5004 msedge.exe 84 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 2976 5004 msedge.exe 85 PID 5004 wrote to memory of 4688 5004 msedge.exe 86 PID 5004 wrote to memory of 4688 5004 msedge.exe 86 PID 5004 wrote to memory of 5048 5004 msedge.exe 87 PID 5004 wrote to memory of 5048 5004 msedge.exe 87 PID 5004 wrote to memory of 5048 5004 msedge.exe 87 PID 5004 wrote to memory of 5048 5004 msedge.exe 87 PID 5004 wrote to memory of 5048 5004 msedge.exe 87 PID 5004 wrote to memory of 5048 5004 msedge.exe 87 PID 5004 wrote to memory of 5048 5004 msedge.exe 87 PID 5004 wrote to memory of 5048 5004 msedge.exe 87 PID 5004 wrote to memory of 5048 5004 msedge.exe 87 PID 5004 wrote to memory of 5048 5004 msedge.exe 87 PID 5004 wrote to memory of 5048 5004 msedge.exe 87 PID 5004 wrote to memory of 5048 5004 msedge.exe 87 PID 5004 wrote to memory of 5048 5004 msedge.exe 87 PID 5004 wrote to memory of 5048 5004 msedge.exe 87 PID 5004 wrote to memory of 5048 5004 msedge.exe 87 PID 5004 wrote to memory of 5048 5004 msedge.exe 87 PID 5004 wrote to memory of 5048 5004 msedge.exe 87 PID 5004 wrote to memory of 5048 5004 msedge.exe 87 PID 5004 wrote to memory of 5048 5004 msedge.exe 87 PID 5004 wrote to memory of 5048 5004 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4f278b1cff0afc318ea23f3a777baea2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8517946f8,0x7ff851794708,0x7ff8517947182⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,13277890071931849117,13187958953999052327,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,13277890071931849117,13187958953999052327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,13277890071931849117,13187958953999052327,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13277890071931849117,13187958953999052327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13277890071931849117,13187958953999052327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13277890071931849117,13187958953999052327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13277890071931849117,13187958953999052327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13277890071931849117,13187958953999052327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13277890071931849117,13187958953999052327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6180 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13277890071931849117,13187958953999052327,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6196 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,13277890071931849117,13187958953999052327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6536 /prefetch:82⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,13277890071931849117,13187958953999052327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6536 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13277890071931849117,13187958953999052327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13277890071931849117,13187958953999052327,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,13277890071931849117,13187958953999052327,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3708 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2176
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD540b73158cf763051f7dd5a4db0ed3995
SHA1c1db48fca5942fb19944c57b60678bf40c123ffd
SHA2561bbe01cc08f11c605942151691365a0cbf89b9af06197c1d68f4a14a18b1b181
SHA512424c23528b7070884c5c3ccf906289aef2954d077bb1bddf54aae278ee59003add42f72ee8d2c5415a111abaecd60eea5bf441f92ab6ac1d1bfc4e6e42ddd303
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5e765bd01e1495b353c49036647b0e11c
SHA15338a943055e453588e1e6964d8dbd76ce7c40da
SHA256ec68b6a5837402a55cdbbae32858a26aad235d78b1e57a8eef871296be1f0569
SHA5120a182572fdab830afaa1874ae84d0a47a9b9fde539e67cdb36b07b205fe14888f2449322a5a692b96f2ba914187a88000aa93e102df4c9c24c8bd4b2187699ec
-
Filesize
820B
MD57fd3a60a0b24a3346a8921a132316a76
SHA160ca937e776be97dad23be028a8535e60b94d93d
SHA256501423012afae977aa7b41a3807c04cf296079449df47ab72d5bd5d1d1bf52ce
SHA51236c357d6678f0b51e88a005e193dc9f1287f5b1357d7577b774edc39a0284d1ca26b7d906e2d5b6517ddc40f4c2ce73e0d25661e9d26061197272b58e8e2be59
-
Filesize
5KB
MD53463ff4ea94eac9d226ff2fb38b69c11
SHA16f8d6f27eb04a09e76cd4bb37fd62c965b4a18c3
SHA2562b95d8925e181c2347a3709a2cb409354be34c639846a722716b26b81c1bf9e8
SHA5127cd707fac8a0379cc439e10e8b6b8c30f8deb68cd2e81cb62155372543d963dfd2bac3fb2c784d075d5003018b7b37c91c12ddc3b396e4dd91688c7f72731928
-
Filesize
6KB
MD51b6771a263a2ae0e254155240a55a5fe
SHA1b7a200bcbdd6381035d6e052d9929bc3d608fef2
SHA256045ac69c851cff6b85ba189d354f31057b317215cd3aa684597176b5621ceec8
SHA5125e78f759cbdf10bd2a8a6da99dccaaf0e6c58d0743bed513935282da2171e969b943aa9f769a7bf679e8697908a825065c62e0679e41c64907132538b3bc00e1
-
Filesize
6KB
MD5ea31a8a0c1b287c51f35aa9ea28100af
SHA126b98a1704c68b5b74def58fcd263929d3c68296
SHA2563ece78c3ca9c36a1003fc8605cec2535b358e5b76b79eff5915b87a44d03cd00
SHA512a1ab9cf012fa1e4835095b2b032a0963823081a8f6eff57499cc1fa2cd65bd6a9b9feccfb98c0958508c609fbcee5cb8cd145f3114b9222b7f7551df2d1e1d2d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5c2ec553aa145b144beea2d94c8b7185a
SHA18cc4dd30712534a2a090d975a7ff98e7f79fdbd8
SHA2564ace93bb9a4951ee351aafb1cf8729a2ca09bede8c5ca703eca583fdf87ae27c
SHA5122f6d91707cc307708241c5d638af4822d1c1cdc6a0da48c6fcae595d270ac4e171a594828e97dbecfbb11824ee173f6864b2692d8308b09da1fdd1d50ba0859d