Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
8058e91bc1241454a3cdb2d9f55c76ee_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8058e91bc1241454a3cdb2d9f55c76ee_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8058e91bc1241454a3cdb2d9f55c76ee_JaffaCakes118.html
-
Size
175KB
-
MD5
8058e91bc1241454a3cdb2d9f55c76ee
-
SHA1
d41bd880708a969cf0837bb11ea3603b5f2277f6
-
SHA256
d83bf6fbe24e9d34bcf84c998c9281dc45b0438826991e441a0fb2a57c879ea2
-
SHA512
f0b97bdfd2b0b83aec40cd6829090fb05580c7fac4c620fda115e37c82a9a510990c32df2c7f1a0ef16eb9e877e7fe62f678567cc9f48fa9312822296611537f
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3TGNkFKYfBCJisjC+aeTH+WK/Lf1/hmnV+:SOoT3T/FLBCJikm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1028 msedge.exe 1028 msedge.exe 940 msedge.exe 940 msedge.exe 2872 identity_helper.exe 2872 identity_helper.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 940 wrote to memory of 5088 940 msedge.exe 84 PID 940 wrote to memory of 5088 940 msedge.exe 84 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 4604 940 msedge.exe 86 PID 940 wrote to memory of 1028 940 msedge.exe 87 PID 940 wrote to memory of 1028 940 msedge.exe 87 PID 940 wrote to memory of 3692 940 msedge.exe 88 PID 940 wrote to memory of 3692 940 msedge.exe 88 PID 940 wrote to memory of 3692 940 msedge.exe 88 PID 940 wrote to memory of 3692 940 msedge.exe 88 PID 940 wrote to memory of 3692 940 msedge.exe 88 PID 940 wrote to memory of 3692 940 msedge.exe 88 PID 940 wrote to memory of 3692 940 msedge.exe 88 PID 940 wrote to memory of 3692 940 msedge.exe 88 PID 940 wrote to memory of 3692 940 msedge.exe 88 PID 940 wrote to memory of 3692 940 msedge.exe 88 PID 940 wrote to memory of 3692 940 msedge.exe 88 PID 940 wrote to memory of 3692 940 msedge.exe 88 PID 940 wrote to memory of 3692 940 msedge.exe 88 PID 940 wrote to memory of 3692 940 msedge.exe 88 PID 940 wrote to memory of 3692 940 msedge.exe 88 PID 940 wrote to memory of 3692 940 msedge.exe 88 PID 940 wrote to memory of 3692 940 msedge.exe 88 PID 940 wrote to memory of 3692 940 msedge.exe 88 PID 940 wrote to memory of 3692 940 msedge.exe 88 PID 940 wrote to memory of 3692 940 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8058e91bc1241454a3cdb2d9f55c76ee_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe6c446f8,0x7ffbe6c44708,0x7ffbe6c447182⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,15429369511790295275,6694107937389392150,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,15429369511790295275,6694107937389392150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,15429369511790295275,6694107937389392150,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15429369511790295275,6694107937389392150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15429369511790295275,6694107937389392150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15429369511790295275,6694107937389392150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15429369511790295275,6694107937389392150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15429369511790295275,6694107937389392150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15429369511790295275,6694107937389392150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,15429369511790295275,6694107937389392150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,15429369511790295275,6694107937389392150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15429369511790295275,6694107937389392150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15429369511790295275,6694107937389392150,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15429369511790295275,6694107937389392150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15429369511790295275,6694107937389392150,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,15429369511790295275,6694107937389392150,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3188
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2936
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:2340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
46KB
MD5b4e4c40ba1b021933f86142b1010c253
SHA18901690b1040e46b360f7b39ecb9f9e342bd20af
SHA256a1ad4fde10e0f378aeeb97ec0aaa27bbdba9ed434a0334052f0230e09fd891ae
SHA512452cbfc40d99d69d65271ab7a6fb62c87d123813fe20898d13b938c13d54efb2e33eb04e165f18e9e91b6a0d02b3282b8e3bf2b8c65efaa974022d14c07bcfd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5e2a3b2445d0584b8e8c724bf10033488
SHA12ce04ea9824df0c0748690b1c9383e3441251335
SHA256ffbda5320cf759136e8157dc383cc8bd76f18c731be3e1607596d61373dadb6b
SHA512806f448b9554735b6e2d4a5d19a8189f1674c0ccbeae46280a67a51ff562abd0adb1cff189239ceaf8ff7f6160b0343832ee72edd85d5a9083934ddaeadf2187
-
Filesize
2KB
MD54a499abb838a129a0eeec5b0012cf04b
SHA1c9d48f24fba898ed7e8b31bfc81d42441991d09c
SHA256054e595dada27fc28dd71f5f5cd163cfff302fe3419b9a0a30d5ee626e49bccf
SHA5125a54b82c8c1cf66bdf2a4488409867d6f66939261760398d43c745bc56a5493b3da2ea6e5cd0ecc02065096a824f556e58e0520535b3b0348518e272ecf8710d
-
Filesize
2KB
MD53ba038e43b6403d2629e2997dc08e228
SHA1b0c5d1f6f159993b2daac72d918afb6ae240ce83
SHA2563a1885c459b0f33b7af4474620009d1d821e3832cfec88f61e274f65d33f491b
SHA512142684341ac29011ffd7feee96acc60fae4038ceef388ec7b26ef52ce9a687e956c30fa43aa76a200e7cad459db06c9b40577e427590cee2d8ff0754e20c44c0
-
Filesize
6KB
MD5b07cd6cb745326bf6a3d875756ee6ab2
SHA19b52b4b2cb5fb5263ee25521bfa7c3898d25ac58
SHA256d66f1241c65dce330628736965837a7dda920383ca0d067c3257e483dcb991c0
SHA512393641e178a0404188736622d9659e05d967e4e6c21a98b6c7ce7cbcdf1c83006eb888d2ffd26482087b43fda9e017dcdcd865c15c784e7fce7fadd8c17989f4
-
Filesize
7KB
MD5f6735668280ebad5f493e555a5be6fa4
SHA1879e8284c957a5eebdc2e2797f803673c2718aae
SHA256d97ccf1fed72f65e2a9d021e6b475bb2681e58c6f8b7caa24401d6853c14a64c
SHA512aae922da27437fc32cd782ba340113f587b887395ecbf34af608cf64a8e3f1395ab1e5b7566d9e47115fbb7c2054556e5d26f1a8fe4a8aba08840be3fd909fb5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50695a3c699b2c8bc65ee3d3103b18ddb
SHA192b78b95bc9f652cc5335ad4c37bc7a02551cca0
SHA256c706d6f2b5fa746969f38f74247b40f566e99774e76135b97b8ee4d41ba24375
SHA5125b668557275e346121cef63e64e9fecc5ee0e5767c59a434eb6494fb46accbaeeb676695f49999dbea3115792bb5f3f82741ddac2565596d6d90bd5793d99f26