Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 14:00
Static task
static1
Behavioral task
behavioral1
Sample
75b60e3923e2958dfb813d8c1cb4b7c2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
75b60e3923e2958dfb813d8c1cb4b7c2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
75b60e3923e2958dfb813d8c1cb4b7c2_JaffaCakes118.html
-
Size
19KB
-
MD5
75b60e3923e2958dfb813d8c1cb4b7c2
-
SHA1
c3b640137ed12e71daecacf1e4e23c1ff6299188
-
SHA256
cdc844ed01d56ca3f40754fff7b508eaaffd533ae1736617017bb1594e1f464c
-
SHA512
cc06382454980b4e84bd419249c00bb08bb47d1670824ca723a751f9512b3442f17730c149d82ec59ba34e0b5372a98b9a331b3ed959466e09fc94636fa12c9d
-
SSDEEP
384:p+t9hXu+1xO1Mb6Ix1xTD3ObWTdxCIImrA8y0BstF:pUi+1xOMbJnxX+bCCUly0Bs3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1600 msedge.exe 1600 msedge.exe 3908 msedge.exe 3908 msedge.exe 1196 identity_helper.exe 1196 identity_helper.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3908 wrote to memory of 4168 3908 msedge.exe 83 PID 3908 wrote to memory of 4168 3908 msedge.exe 83 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 5052 3908 msedge.exe 84 PID 3908 wrote to memory of 1600 3908 msedge.exe 85 PID 3908 wrote to memory of 1600 3908 msedge.exe 85 PID 3908 wrote to memory of 4804 3908 msedge.exe 86 PID 3908 wrote to memory of 4804 3908 msedge.exe 86 PID 3908 wrote to memory of 4804 3908 msedge.exe 86 PID 3908 wrote to memory of 4804 3908 msedge.exe 86 PID 3908 wrote to memory of 4804 3908 msedge.exe 86 PID 3908 wrote to memory of 4804 3908 msedge.exe 86 PID 3908 wrote to memory of 4804 3908 msedge.exe 86 PID 3908 wrote to memory of 4804 3908 msedge.exe 86 PID 3908 wrote to memory of 4804 3908 msedge.exe 86 PID 3908 wrote to memory of 4804 3908 msedge.exe 86 PID 3908 wrote to memory of 4804 3908 msedge.exe 86 PID 3908 wrote to memory of 4804 3908 msedge.exe 86 PID 3908 wrote to memory of 4804 3908 msedge.exe 86 PID 3908 wrote to memory of 4804 3908 msedge.exe 86 PID 3908 wrote to memory of 4804 3908 msedge.exe 86 PID 3908 wrote to memory of 4804 3908 msedge.exe 86 PID 3908 wrote to memory of 4804 3908 msedge.exe 86 PID 3908 wrote to memory of 4804 3908 msedge.exe 86 PID 3908 wrote to memory of 4804 3908 msedge.exe 86 PID 3908 wrote to memory of 4804 3908 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\75b60e3923e2958dfb813d8c1cb4b7c2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff86fc46f8,0x7fff86fc4708,0x7fff86fc47182⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,8464534469243567767,2386987051206844451,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,8464534469243567767,2386987051206844451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,8464534469243567767,2386987051206844451,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8464534469243567767,2386987051206844451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8464534469243567767,2386987051206844451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8464534469243567767,2386987051206844451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8464534469243567767,2386987051206844451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,8464534469243567767,2386987051206844451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6296 /prefetch:82⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,8464534469243567767,2386987051206844451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8464534469243567767,2386987051206844451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8464534469243567767,2386987051206844451,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8464534469243567767,2386987051206844451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8464534469243567767,2386987051206844451,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,8464534469243567767,2386987051206844451,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD54819a46b1905bce794e336892d819670
SHA14b488a9d5d1f6085fec3cf987527252ecb52e4b6
SHA256ec4d7b24f42e940261af2d1b19a8f9fa2c687cd7bba5e57588dff4af1830b38f
SHA5124ba2ecbe4dc26ece9d4df271f39808a1308755d30429586084ccef224bb86cf5ef67d1ff4ce1b3bb2669851547a7e94a4ac35f79bd848193d9eb43801ec431a7
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
827B
MD586657a695a2d544421e2fdf455d80635
SHA1dc643b863fcc643b054f30141db61ef3f6e9c05f
SHA256870fb6853b08af8e1d5fb332e2375cfcf36b73d0a8e27a66c9945f8fb44b4b5d
SHA512e9b325b8839819acbe9195bfa2d0f768ce4d59cdfc3e90941e935af353bca796fb5a103ba7a7290cff01654078e1274ead644d6c37b5636821e01e225f50aeb2
-
Filesize
592B
MD523412baf4fa1deaca8a5af94b2f82d73
SHA1f1d47138303f9358b64c2b41ad5e8ef7406050a8
SHA256ba314c0adf7c3c9cb08caa0dcea545ad2413a772652be778e765afe0ce6961f1
SHA512d85b08f9f47536a5ce264b22c68df08024aa383e448064383c4f692f49486e89fad21d98c9b58023d7a6fde264f29d6f5381b910de210bc1493fc479ac273687
-
Filesize
5KB
MD518425e5dd3eeffa7e44cb7479c0a6154
SHA11dbbca59529427569f50bdaa2ecd83c4fb298172
SHA256ec83b81cfa420b8da80c28a0e210562b323e39e8d5531f14df4fbceecbbcea57
SHA512500c7951454dbc03208b7a97cf9687bf6b16c9b3e0b3b5ffe3ddefa6c039edef9a9e9c1f650ea31650458b6d675b0b2e30da75560d1a26c2b2a29498c98f0f76
-
Filesize
6KB
MD5bfc55751b39ed44c550f2babbff409f9
SHA127938358685a5ce735ea562ef94fbf02b9778dd7
SHA25621f4073fcb8bbed5cc536afb797ae5f1191f6700de97bcf52c833a774999bbbe
SHA51227fe8f9f066df2292f852fdba9cdca2fd6819957dd16ead0d3711954ce95bbaa7d7d2f59b743981645bc0ecc6edcf8d9ed5e7a9b187d6b5fabf93d121b9c02dd
-
Filesize
6KB
MD5c71a2be1c31e652c18f81e6fc1bc5e69
SHA1df3aebb90479b224f2c32da2392b366ff6e60f17
SHA2567738187e72f2284b0072d41cbf3acdfd7c4097b98f1f53fca45e6c6973b3204f
SHA512b9053cf4eee438e9fc47304af7b4717e3d9eb520c55d53600bd1494dc3712e498a9ec5a5e79ebb06235ef06e2aa0f9c1abc2454f4a21b5de24506ad20dd6743a
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD522067c304411248a43b2dca86335fd06
SHA13da375dc92b94c676a256100d1ffda4a5ddb6b20
SHA256626004ce965885bcee431145ddfb2837497188a7f6d7c29bdf32f9dd4818df23
SHA51275aae1124f84812ab1d4bfcb32c893163ec14d4284f83896b37d0984baa7eb259ddea8adf018a411b79652afda6922a27292f82557a22d24201d1454b0ca4323